<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2026-04-15T04:48:28</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:3545" version="1" class="patch">
	<metadata>
		<title>security update for CVE-2023-20867: open-vm-tools fix (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-20867" ref_url="https://www.suse.com/security/cve/CVE-2023-20867/" source="CVE"/>
		<description>
CVE-2023-20867 fix for open-vm-tools		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20867/">CVE-2023-20867 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804127" comment="open-vm-tools-12.1.5-1.el9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804128" comment="open-vm-tools-desktop-12.1.5-1.el9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804129" comment="open-vm-tools-devel-12.1.5-1.el9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804130" comment="open-vm-tools-salt-minion-12.1.5-1.el9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804131" comment="open-vm-tools-sdmp-12.1.5-1.el9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804132" comment="open-vm-tools-test-12.1.5-1.el9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3546" version="1" class="patch">
	<metadata>
		<title>security update for shim from RHSA-2024:1903 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<description>
This security update provides a functional equivalent of RHSA-2024:1903. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024:1903		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947411" comment="shim-x64-15.8-4.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3547" version="1" class="patch">
	<metadata>
		<title>Moderate: tbb security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
Threading Building Blocks (TBB) is a C++ runtime library that abstracts the low-level threading details necessary for optimal multi-core performance. Security Fix(es): jquery: Untrusted code execution via &lt;option&gt; tag in HTML passed to DOM manipulation methods (CVE-2020-11023) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965018" comment="python3-tbb-2020.3-8.el9_5.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965019" comment="tbb-2020.3-8.el9_5.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965020" comment="tbb-devel-2020.3-8.el9_5.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965021" comment="tbb-doc-2020.3-8.el9_5.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3548" version="1" class="patch">
	<metadata>
		<title>Moderate: gcc-toolset-14-gcc security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
The gcc-toolset-14-gcc13 package contains the GNU Compiler Collection version 14.Security Fix(es): jquery: Untrusted code execution via &lt;option&gt; tag in HTML passed to DOM manipulation methods (CVE-2020-11023) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965022" comment="gcc-toolset-14-gcc-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965023" comment="gcc-toolset-14-gcc-c++-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965024" comment="gcc-toolset-14-gcc-gfortran-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965025" comment="gcc-toolset-14-gcc-plugin-annobin-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965026" comment="gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965027" comment="gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965028" comment="gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965029" comment="gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965030" comment="gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965031" comment="gcc-toolset-14-libhwasan-devel-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965032" comment="gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965033" comment="gcc-toolset-14-liblsan-devel-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965034" comment="gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965035" comment="gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965036" comment="gcc-toolset-14-libstdc++-docs-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965037" comment="gcc-toolset-14-libtsan-devel-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965038" comment="gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965039" comment="gcc-toolset-14-offload-nvptx-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965040" comment="libasan8-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965041" comment="libhwasan-14.2.1-1.3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965042" comment="libtsan2-14.2.1-1.3.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3549" version="1" class="patch">
	<metadata>
		<title>Moderate: gcc-toolset-13-gcc security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
The gcc-toolset-13-gcc13 package contains the GNU Compiler Collection version 13.Security Fix(es): jquery: Untrusted code execution via &lt;option&gt; tag in HTML passed to DOM manipulation methods (CVE-2020-11023) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965043" comment="gcc-toolset-13-gcc-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965044" comment="gcc-toolset-13-gcc-c++-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965045" comment="gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965046" comment="gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965047" comment="gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965048" comment="gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965049" comment="gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965050" comment="gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965051" comment="gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965052" comment="gcc-toolset-13-libhwasan-devel-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965053" comment="gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965054" comment="gcc-toolset-13-liblsan-devel-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965055" comment="gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965056" comment="gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965057" comment="gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965058" comment="gcc-toolset-13-libtsan-devel-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965059" comment="gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965060" comment="gcc-toolset-13-offload-nvptx-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965061" comment="libasan8-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965062" comment="libhwasan-13.3.1-2.2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965063" comment="libtsan2-13.3.1-2.2.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3550" version="1" class="patch">
	<metadata>
		<title>Important: pcs security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-46727" ref_url="https://www.suse.com/security/cve/CVE-2025-46727/" source="CVE"/>
		<description>
The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.Security Fix(es): rubygem-rack: Unbounded-Parameter DoS in Rack::QueryParser (CVE-2025-46727) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46727/">CVE-2025-46727 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46727">CVE-2025-46727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985809" comment="pcs-0.11.9-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985810" comment="pcs-snmp-0.11.9-2.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3551" version="1" class="patch">
	<metadata>
		<title>bugfix update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1650" ref_url="https://www.suse.com/security/cve/CVE-2022-1650/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2022:5749.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2022:5749.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1650/">CVE-2022-1650 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1650">CVE-2022-1650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053614" comment="aspnetcore-runtime-6.0-6.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053615" comment="aspnetcore-targeting-pack-6.0-6.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053616" comment="dotnet-apphost-pack-6.0-6.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053617" comment="dotnet-host-6.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053618" comment="dotnet-hostfxr-6.0-6.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053619" comment="dotnet-runtime-6.0-6.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053620" comment="dotnet-sdk-6.0-6.0.107-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053621" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.107-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053622" comment="dotnet-targeting-pack-6.0-6.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053623" comment="dotnet-templates-6.0-6.0.107-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053624" comment="netstandard-targeting-pack-2.1-6.0.107-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3552" version="1" class="patch">
	<metadata>
		<title>bugfix update for pki-servlet-engine (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-42340" ref_url="https://www.suse.com/security/cve/CVE-2021-42340/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2022:8077.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2022:8077.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42340/">CVE-2021-42340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42340">CVE-2021-42340 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053625" comment="pki-servlet-4.0-api-9.0.50-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053626" comment="pki-servlet-engine-9.0.50-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3553" version="1" class="patch">
	<metadata>
		<title>bugfix update for qatzip (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-36369" ref_url="https://www.suse.com/security/cve/CVE-2022-36369/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2022:8256.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2022:8256.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-36369/">CVE-2022-36369 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36369">CVE-2022-36369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053627" comment="qatzip-1.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053628" comment="qatzip-devel-1.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053629" comment="qatzip-libs-1.0.9-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3554" version="1" class="patch">
	<metadata>
		<title>bugfix update for expat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2013-0340" ref_url="https://www.suse.com/security/cve/CVE-2013-0340/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2022:8290.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2022:8290.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0340/">CVE-2013-0340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0340">CVE-2013-0340 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053630" comment="expat-2.4.9-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053631" comment="expat-devel-2.4.9-1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3555" version="1" class="patch">
	<metadata>
		<title>bugfix update for microcode_ctl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-0005" ref_url="https://www.suse.com/security/cve/CVE-2022-0005/" source="CVE"/>
		<reference ref_id="CVE-2022-21136" ref_url="https://www.suse.com/security/cve/CVE-2022-21136/" source="CVE"/>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2022:8351.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2022:8351.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0005/">CVE-2022-0005 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0005">CVE-2022-0005 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21136/">CVE-2022-21136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21136">CVE-2022-21136 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053632" comment="microcode_ctl-20220809-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3556" version="1" class="patch">
	<metadata>
		<title>bugfix update for delve (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724/" source="CVE"/>
		<reference ref_id="CVE-2022-41725" ref_url="https://www.suse.com/security/cve/CVE-2022-41725/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2023:2181.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2023:2181.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41725/">CVE-2022-41725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053633" comment="delve-1.9.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053634" comment="go-toolset-1.19.6-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053635" comment="golang-1.19.6-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053636" comment="golang-bin-1.19.6-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053637" comment="golang-docs-1.19.6-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053638" comment="golang-misc-1.19.6-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053639" comment="golang-race-1.19.6-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053640" comment="golang-src-1.19.6-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053641" comment="golang-tests-1.19.6-2.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3557" version="1" class="patch">
	<metadata>
		<title>bugfix update for delve (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318/" source="CVE"/>
		<reference ref_id="CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319/" source="CVE"/>
		<reference ref_id="CVE-2023-39321" ref_url="https://www.suse.com/security/cve/CVE-2023-39321/" source="CVE"/>
		<reference ref_id="CVE-2023-39322" ref_url="https://www.suse.com/security/cve/CVE-2023-39322/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2023:6364.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2023:6364.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39321/">CVE-2023-39321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39322/">CVE-2023-39322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053642" comment="delve-1.20.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053643" comment="go-toolset-1.20.10-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053644" comment="golang-1.20.10-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053645" comment="golang-bin-1.20.10-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053646" comment="golang-docs-1.20.10-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053647" comment="golang-misc-1.20.10-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053648" comment="golang-src-1.20.10-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053649" comment="golang-tests-1.20.10-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3558" version="1" class="patch">
	<metadata>
		<title>bugfix update for libssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2024:1127.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2024:1127.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053650" comment="libssh-0.10.4-12.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053651" comment="libssh-config-0.10.4-12.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053652" comment="libssh-devel-0.10.4-12.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3559" version="1" class="patch">
	<metadata>
		<title>bugfix update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2024:1136.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2024:1136.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053653" comment="podman-4.6.1-8.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053654" comment="podman-docker-4.6.1-8.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053655" comment="podman-gvproxy-4.6.1-8.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053656" comment="podman-plugins-4.6.1-8.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053657" comment="podman-remote-4.6.1-8.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053658" comment="podman-tests-4.6.1-8.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3560" version="1" class="patch">
	<metadata>
		<title>bugfix update for git-lfs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2024:2274.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2024:2274.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053659" comment="git-lfs-3.4.1-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3561" version="1" class="patch">
	<metadata>
		<title>bugfix update for glibc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4806" ref_url="https://www.suse.com/security/cve/CVE-2023-4806/" source="CVE"/>
		<reference ref_id="CVE-2023-4813" ref_url="https://www.suse.com/security/cve/CVE-2023-4813/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2024:2413.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2024:2413.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4806/">CVE-2023-4806 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4806">CVE-2023-4806 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4813/">CVE-2023-4813 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4813">CVE-2023-4813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053660" comment="glibc-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053661" comment="glibc-all-langpacks-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053662" comment="glibc-benchtests-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053663" comment="glibc-common-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053664" comment="glibc-devel-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053665" comment="glibc-doc-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053666" comment="glibc-gconv-extra-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053667" comment="glibc-headers-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053668" comment="glibc-langpack-aa-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053669" comment="glibc-langpack-af-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053670" comment="glibc-langpack-agr-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053671" comment="glibc-langpack-ak-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053672" comment="glibc-langpack-am-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053673" comment="glibc-langpack-an-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053674" comment="glibc-langpack-anp-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053675" comment="glibc-langpack-ar-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053676" comment="glibc-langpack-as-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053677" comment="glibc-langpack-ast-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053678" comment="glibc-langpack-ayc-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053679" comment="glibc-langpack-az-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053680" comment="glibc-langpack-be-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053681" comment="glibc-langpack-bem-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053682" comment="glibc-langpack-ber-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053683" comment="glibc-langpack-bg-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053684" comment="glibc-langpack-bhb-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053685" comment="glibc-langpack-bho-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053686" comment="glibc-langpack-bi-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053687" comment="glibc-langpack-bn-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053688" comment="glibc-langpack-bo-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053689" comment="glibc-langpack-br-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053690" comment="glibc-langpack-brx-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053691" comment="glibc-langpack-bs-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053692" comment="glibc-langpack-byn-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053693" comment="glibc-langpack-ca-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053694" comment="glibc-langpack-ce-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053695" comment="glibc-langpack-chr-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053696" comment="glibc-langpack-ckb-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053697" comment="glibc-langpack-cmn-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053698" comment="glibc-langpack-crh-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053699" comment="glibc-langpack-cs-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053700" comment="glibc-langpack-csb-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053701" comment="glibc-langpack-cv-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053702" comment="glibc-langpack-cy-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053703" comment="glibc-langpack-da-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053704" comment="glibc-langpack-de-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053705" comment="glibc-langpack-doi-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053706" comment="glibc-langpack-dsb-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053707" comment="glibc-langpack-dv-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053708" comment="glibc-langpack-dz-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053709" comment="glibc-langpack-el-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053710" comment="glibc-langpack-en-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053711" comment="glibc-langpack-eo-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053712" comment="glibc-langpack-es-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053713" comment="glibc-langpack-et-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053714" comment="glibc-langpack-eu-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053715" comment="glibc-langpack-fa-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053716" comment="glibc-langpack-ff-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053717" comment="glibc-langpack-fi-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053718" comment="glibc-langpack-fil-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053719" comment="glibc-langpack-fo-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053720" comment="glibc-langpack-fr-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053721" comment="glibc-langpack-fur-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053722" comment="glibc-langpack-fy-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053723" comment="glibc-langpack-ga-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053724" comment="glibc-langpack-gd-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053725" comment="glibc-langpack-gez-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053726" comment="glibc-langpack-gl-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053727" comment="glibc-langpack-gu-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053728" comment="glibc-langpack-gv-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053729" comment="glibc-langpack-ha-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053730" comment="glibc-langpack-hak-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053731" comment="glibc-langpack-he-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053732" comment="glibc-langpack-hi-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053733" comment="glibc-langpack-hif-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053734" comment="glibc-langpack-hne-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053735" comment="glibc-langpack-hr-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053736" comment="glibc-langpack-hsb-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053737" comment="glibc-langpack-ht-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053738" comment="glibc-langpack-hu-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053739" comment="glibc-langpack-hy-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053740" comment="glibc-langpack-ia-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053741" comment="glibc-langpack-id-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053742" comment="glibc-langpack-ig-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053743" comment="glibc-langpack-ik-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053744" comment="glibc-langpack-is-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053745" comment="glibc-langpack-it-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053746" comment="glibc-langpack-iu-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053747" comment="glibc-langpack-ja-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053748" comment="glibc-langpack-ka-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053749" comment="glibc-langpack-kab-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053750" comment="glibc-langpack-kk-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053751" comment="glibc-langpack-kl-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053752" comment="glibc-langpack-km-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053753" comment="glibc-langpack-kn-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053754" comment="glibc-langpack-ko-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053755" comment="glibc-langpack-kok-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053756" comment="glibc-langpack-ks-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053757" comment="glibc-langpack-ku-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053758" comment="glibc-langpack-kw-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053759" comment="glibc-langpack-ky-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053760" comment="glibc-langpack-lb-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053761" comment="glibc-langpack-lg-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053762" comment="glibc-langpack-li-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053763" comment="glibc-langpack-lij-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053764" comment="glibc-langpack-ln-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053765" comment="glibc-langpack-lo-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053766" comment="glibc-langpack-lt-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053767" comment="glibc-langpack-lv-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053768" comment="glibc-langpack-lzh-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053769" comment="glibc-langpack-mag-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053770" comment="glibc-langpack-mai-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053771" comment="glibc-langpack-mfe-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053772" comment="glibc-langpack-mg-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053773" comment="glibc-langpack-mhr-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053774" comment="glibc-langpack-mi-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053775" comment="glibc-langpack-miq-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053776" comment="glibc-langpack-mjw-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053777" comment="glibc-langpack-mk-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053778" comment="glibc-langpack-ml-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053779" comment="glibc-langpack-mn-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053780" comment="glibc-langpack-mni-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053781" comment="glibc-langpack-mnw-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053782" comment="glibc-langpack-mr-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053783" comment="glibc-langpack-ms-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053784" comment="glibc-langpack-mt-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053785" comment="glibc-langpack-my-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053786" comment="glibc-langpack-nan-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053787" comment="glibc-langpack-nb-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053788" comment="glibc-langpack-nds-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053789" comment="glibc-langpack-ne-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053790" comment="glibc-langpack-nhn-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053791" comment="glibc-langpack-niu-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053792" comment="glibc-langpack-nl-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053793" comment="glibc-langpack-nn-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053794" comment="glibc-langpack-nr-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053795" comment="glibc-langpack-nso-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053796" comment="glibc-langpack-oc-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053797" comment="glibc-langpack-om-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053798" comment="glibc-langpack-or-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053799" comment="glibc-langpack-os-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053800" comment="glibc-langpack-pa-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053801" comment="glibc-langpack-pap-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053802" comment="glibc-langpack-pl-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053803" comment="glibc-langpack-ps-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053804" comment="glibc-langpack-pt-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053805" comment="glibc-langpack-quz-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053806" comment="glibc-langpack-raj-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053807" comment="glibc-langpack-ro-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053808" comment="glibc-langpack-ru-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053809" comment="glibc-langpack-rw-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053810" comment="glibc-langpack-sa-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053811" comment="glibc-langpack-sah-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053812" comment="glibc-langpack-sat-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053813" comment="glibc-langpack-sc-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053814" comment="glibc-langpack-sd-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053815" comment="glibc-langpack-se-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053816" comment="glibc-langpack-sgs-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053817" comment="glibc-langpack-shn-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053818" comment="glibc-langpack-shs-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053819" comment="glibc-langpack-si-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053820" comment="glibc-langpack-sid-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053821" comment="glibc-langpack-sk-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053822" comment="glibc-langpack-sl-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053823" comment="glibc-langpack-sm-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053824" comment="glibc-langpack-so-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053825" comment="glibc-langpack-sq-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053826" comment="glibc-langpack-sr-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053827" comment="glibc-langpack-ss-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053828" comment="glibc-langpack-st-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053829" comment="glibc-langpack-sv-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053830" comment="glibc-langpack-sw-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053831" comment="glibc-langpack-szl-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053832" comment="glibc-langpack-ta-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053833" comment="glibc-langpack-tcy-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053834" comment="glibc-langpack-te-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053835" comment="glibc-langpack-tg-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053836" comment="glibc-langpack-th-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053837" comment="glibc-langpack-the-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053838" comment="glibc-langpack-ti-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053839" comment="glibc-langpack-tig-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053840" comment="glibc-langpack-tk-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053841" comment="glibc-langpack-tl-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053842" comment="glibc-langpack-tn-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053843" comment="glibc-langpack-to-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053844" comment="glibc-langpack-tpi-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053845" comment="glibc-langpack-tr-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053846" comment="glibc-langpack-ts-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053847" comment="glibc-langpack-tt-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053848" comment="glibc-langpack-ug-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053849" comment="glibc-langpack-uk-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053850" comment="glibc-langpack-unm-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053851" comment="glibc-langpack-ur-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053852" comment="glibc-langpack-uz-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053853" comment="glibc-langpack-ve-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053854" comment="glibc-langpack-vi-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053855" comment="glibc-langpack-wa-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053856" comment="glibc-langpack-wae-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053857" comment="glibc-langpack-wal-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053858" comment="glibc-langpack-wo-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053859" comment="glibc-langpack-xh-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053860" comment="glibc-langpack-yi-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053861" comment="glibc-langpack-yo-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053862" comment="glibc-langpack-yue-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053863" comment="glibc-langpack-yuw-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053864" comment="glibc-langpack-zh-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053865" comment="glibc-langpack-zu-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053866" comment="glibc-locale-source-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053867" comment="glibc-minimal-langpack-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053868" comment="glibc-nss-devel-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053869" comment="glibc-static-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053870" comment="glibc-utils-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053871" comment="libnsl-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053872" comment="nscd-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053873" comment="nss_db-2.34-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053874" comment="nss_hesiod-2.34-100.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3562" version="1" class="patch">
	<metadata>
		<title>bugfix update for expat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-28757" ref_url="https://www.suse.com/security/cve/CVE-2024-28757/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2024:2518.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2024:2518.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28757/">CVE-2024-28757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053875" comment="expat-2.5.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053876" comment="expat-devel-2.5.0-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3563" version="1" class="patch">
	<metadata>
		<title>bugfix update for golang (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2024:3840.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2024:3840.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053877" comment="go-toolset-1.21.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053878" comment="golang-1.21.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053879" comment="golang-bin-1.21.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053880" comment="golang-docs-1.21.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053881" comment="golang-misc-1.21.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053882" comment="golang-src-1.21.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053883" comment="golang-tests-1.21.10-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3564" version="1" class="patch">
	<metadata>
		<title>bugfix update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-26664" ref_url="https://www.suse.com/security/cve/CVE-2024-26664/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2024:3983.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2024:3983.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26664/">CVE-2024-26664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26664">CVE-2024-26664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030742" comment="bpftool-7.3.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030743" comment="kernel-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030744" comment="kernel-abi-stablelists-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030745" comment="kernel-core-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030746" comment="kernel-cross-headers-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030747" comment="kernel-debug-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030748" comment="kernel-debug-core-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030751" comment="kernel-debug-modules-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030752" comment="kernel-debug-modules-core-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030753" comment="kernel-debug-modules-extra-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030754" comment="kernel-debug-uki-virt-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030757" comment="kernel-doc-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030758" comment="kernel-headers-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030759" comment="kernel-modules-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030760" comment="kernel-modules-core-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030761" comment="kernel-modules-extra-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030762" comment="kernel-tools-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030763" comment="kernel-tools-libs-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030765" comment="kernel-uki-virt-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030766" comment="libperf-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030767" comment="perf-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030768" comment="python3-perf-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030769" comment="rtla-5.14.0-427.22.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030770" comment="rv-5.14.0-427.22.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3565" version="1" class="patch">
	<metadata>
		<title>bugfix update for ca-certificates (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-37920" ref_url="https://www.suse.com/security/cve/CVE-2023-37920/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2024:5691.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2024:5691.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-37920/">CVE-2023-37920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053884" comment="ca-certificates-2024.2.69_v8.0.303-91.4.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3566" version="1" class="patch">
	<metadata>
		<title>bugfix update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-11831" ref_url="https://www.suse.com/security/cve/CVE-2024-11831/" source="CVE"/>
		<reference ref_id="CVE-2025-21172" ref_url="https://www.suse.com/security/cve/CVE-2025-21172/" source="CVE"/>
		<reference ref_id="CVE-2025-21173" ref_url="https://www.suse.com/security/cve/CVE-2025-21173/" source="CVE"/>
		<reference ref_id="CVE-2025-21176" ref_url="https://www.suse.com/security/cve/CVE-2025-21176/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2025:0304.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2025:0304.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11831/">CVE-2024-11831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11831">CVE-2024-11831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21172/">CVE-2025-21172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21172">CVE-2025-21172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21173/">CVE-2025-21173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21173">CVE-2025-21173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21176/">CVE-2025-21176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21176">CVE-2025-21176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053885" comment="aspnetcore-runtime-8.0-8.0.12-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053886" comment="aspnetcore-runtime-dbg-8.0-8.0.12-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053887" comment="aspnetcore-targeting-pack-8.0-8.0.12-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053888" comment="dotnet-apphost-pack-8.0-8.0.12-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053889" comment="dotnet-hostfxr-8.0-8.0.12-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053890" comment="dotnet-runtime-8.0-8.0.12-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053891" comment="dotnet-runtime-dbg-8.0-8.0.12-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053892" comment="dotnet-sdk-8.0-8.0.112-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053893" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.112-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053894" comment="dotnet-sdk-dbg-8.0-8.0.112-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053895" comment="dotnet-targeting-pack-8.0-8.0.12-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053896" comment="dotnet-templates-8.0-8.0.112-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3567" version="1" class="patch">
	<metadata>
		<title>bugfix update for dotnet9.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21171" ref_url="https://www.suse.com/security/cve/CVE-2025-21171/" source="CVE"/>
		<reference ref_id="CVE-2025-21172" ref_url="https://www.suse.com/security/cve/CVE-2025-21172/" source="CVE"/>
		<reference ref_id="CVE-2025-21173" ref_url="https://www.suse.com/security/cve/CVE-2025-21173/" source="CVE"/>
		<reference ref_id="CVE-2025-21176" ref_url="https://www.suse.com/security/cve/CVE-2025-21176/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2025:0305.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2025:0305.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21171/">CVE-2025-21171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21171">CVE-2025-21171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21172/">CVE-2025-21172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21172">CVE-2025-21172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21173/">CVE-2025-21173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21173">CVE-2025-21173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21176/">CVE-2025-21176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21176">CVE-2025-21176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053897" comment="aspnetcore-runtime-9.0-9.0.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053898" comment="aspnetcore-runtime-dbg-9.0-9.0.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053899" comment="aspnetcore-targeting-pack-9.0-9.0.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053900" comment="dotnet-apphost-pack-9.0-9.0.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053901" comment="dotnet-host-9.0.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053902" comment="dotnet-hostfxr-9.0-9.0.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053903" comment="dotnet-runtime-9.0-9.0.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053904" comment="dotnet-runtime-dbg-9.0-9.0.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053905" comment="dotnet-sdk-9.0-9.0.102-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053906" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.102-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053907" comment="dotnet-sdk-aot-9.0-9.0.102-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053908" comment="dotnet-sdk-dbg-9.0-9.0.102-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053909" comment="dotnet-targeting-pack-9.0-9.0.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053910" comment="dotnet-templates-9.0-9.0.102-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053911" comment="netstandard-targeting-pack-2.1-9.0.102-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3568" version="1" class="patch">
	<metadata>
		<title>bugfix update for linux-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-36350" ref_url="https://www.suse.com/security/cve/CVE-2024-36350/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2025:12877.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2025:12877.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36350/">CVE-2024-36350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36350">CVE-2024-36350 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053912" comment="iwl100-firmware-39.31.5.1-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053913" comment="iwl1000-firmware-39.31.5.1-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053914" comment="iwl105-firmware-18.168.6.1-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053915" comment="iwl135-firmware-18.168.6.1-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053916" comment="iwl2000-firmware-18.168.6.1-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053917" comment="iwl2030-firmware-18.168.6.1-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053918" comment="iwl3160-firmware-25.30.13.0-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053919" comment="iwl5000-firmware-8.83.5.1_1-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053920" comment="iwl5150-firmware-8.24.2.2-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053921" comment="iwl6000g2a-firmware-18.168.6.1-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053922" comment="iwl6000g2b-firmware-18.168.6.1-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053923" comment="iwl6050-firmware-41.28.5.1-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053924" comment="iwl7260-firmware-25.30.13.0-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053925" comment="libertas-sd8787-firmware-20250716-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053926" comment="linux-firmware-20250716-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053927" comment="linux-firmware-whence-20250716-151.3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053928" comment="netronome-firmware-20250716-151.3.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3569" version="1" class="patch">
	<metadata>
		<title>bugfix update for linux-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-36357" ref_url="https://www.suse.com/security/cve/CVE-2024-36357/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2025:15878.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2025:15878.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36357/">CVE-2024-36357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36357">CVE-2024-36357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053929" comment="iwl100-firmware-39.31.5.1-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053930" comment="iwl1000-firmware-39.31.5.1-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053931" comment="iwl105-firmware-18.168.6.1-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053932" comment="iwl135-firmware-18.168.6.1-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053933" comment="iwl2000-firmware-18.168.6.1-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053934" comment="iwl2030-firmware-18.168.6.1-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053935" comment="iwl3160-firmware-25.30.13.0-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053936" comment="iwl5000-firmware-8.83.5.1_1-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053937" comment="iwl5150-firmware-8.24.2.2-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053938" comment="iwl6000g2a-firmware-18.168.6.1-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053939" comment="iwl6000g2b-firmware-18.168.6.1-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053940" comment="iwl6050-firmware-41.28.5.1-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053941" comment="iwl7260-firmware-25.30.13.0-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053942" comment="libertas-sd8787-firmware-20250812-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053943" comment="linux-firmware-20250812-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053944" comment="linux-firmware-whence-20250812-151.4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053945" comment="netronome-firmware-20250812-151.4.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3570" version="1" class="patch">
	<metadata>
		<title>bugfix update for open-vm-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22247" ref_url="https://www.suse.com/security/cve/CVE-2025-22247/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2025:20841.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2025:20841.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22247/">CVE-2025-22247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22247">CVE-2025-22247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053946" comment="open-vm-tools-13.0.0-1.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053947" comment="open-vm-tools-desktop-13.0.0-1.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053948" comment="open-vm-tools-salt-minion-13.0.0-1.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053949" comment="open-vm-tools-sdmp-13.0.0-1.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053950" comment="open-vm-tools-test-13.0.0-1.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3571" version="1" class="patch">
	<metadata>
		<title>bugfix update for mod_proxy_cluster (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-10306" ref_url="https://www.suse.com/security/cve/CVE-2024-10306/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2025:2973.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2025:2973.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10306/">CVE-2024-10306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10306">CVE-2024-10306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053951" comment="mod_proxy_cluster-1.3.22-1.el9_5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3572" version="1" class="patch">
	<metadata>
		<title>bugfix update for microcode_ctl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-34440" ref_url="https://www.suse.com/security/cve/CVE-2023-34440/" source="CVE"/>
		<reference ref_id="CVE-2023-43758" ref_url="https://www.suse.com/security/cve/CVE-2023-43758/" source="CVE"/>
		<reference ref_id="CVE-2024-24582" ref_url="https://www.suse.com/security/cve/CVE-2024-24582/" source="CVE"/>
		<reference ref_id="CVE-2024-28127" ref_url="https://www.suse.com/security/cve/CVE-2024-28127/" source="CVE"/>
		<reference ref_id="CVE-2024-29214" ref_url="https://www.suse.com/security/cve/CVE-2024-29214/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2025:2991.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2025:2991.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34440/">CVE-2023-34440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-34440">CVE-2023-34440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-43758/">CVE-2023-43758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43758">CVE-2023-43758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24582/">CVE-2024-24582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24582">CVE-2024-24582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28127/">CVE-2024-28127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28127">CVE-2024-28127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-29214/">CVE-2024-29214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29214">CVE-2024-29214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053952" comment="microcode_ctl-20240910-1.20250211.1.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3573" version="1" class="patch">
	<metadata>
		<title>bugfix update for microcode_ctl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2024-43420" ref_url="https://www.suse.com/security/cve/CVE-2024-43420/" source="CVE"/>
		<reference ref_id="CVE-2024-45332" ref_url="https://www.suse.com/security/cve/CVE-2024-45332/" source="CVE"/>
		<reference ref_id="CVE-2025-20012" ref_url="https://www.suse.com/security/cve/CVE-2025-20012/" source="CVE"/>
		<reference ref_id="CVE-2025-20623" ref_url="https://www.suse.com/security/cve/CVE-2025-20623/" source="CVE"/>
		<reference ref_id="CVE-2025-24495" ref_url="https://www.suse.com/security/cve/CVE-2025-24495/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2025:9433.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2025:9433.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-43420/">CVE-2024-43420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43420">CVE-2024-43420 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-45332/">CVE-2024-45332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45332">CVE-2024-45332 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-20012/">CVE-2025-20012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20012">CVE-2025-20012 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20623/">CVE-2025-20623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20623">CVE-2025-20623 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24495/">CVE-2025-24495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24495">CVE-2025-24495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053953" comment="microcode_ctl-20250211-1.20250512.1.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3574" version="1" class="patch">
	<metadata>
		<title>enhancement update for nginx (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This enhancement update provides a functional equivalent of RHEA-2023:6562.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHEA-2023:6562.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053954" comment="nginx-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053955" comment="nginx-all-modules-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053956" comment="nginx-core-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053957" comment="nginx-filesystem-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053958" comment="nginx-mod-devel-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053959" comment="nginx-mod-http-image-filter-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053960" comment="nginx-mod-http-perl-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053961" comment="nginx-mod-http-xslt-filter-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053962" comment="nginx-mod-mail-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053963" comment="nginx-mod-stream-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3575" version="1" class="patch">
	<metadata>
		<title>enhancement update for microcode_ctl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-21216" ref_url="https://www.suse.com/security/cve/CVE-2022-21216/" source="CVE"/>
		<reference ref_id="CVE-2022-33196" ref_url="https://www.suse.com/security/cve/CVE-2022-33196/" source="CVE"/>
		<description>
This enhancement update provides a functional equivalent of RHEA-2023:6637.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHEA-2023:6637.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21216/">CVE-2022-21216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21216">CVE-2022-21216 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-33196/">CVE-2022-33196 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33196">CVE-2022-33196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053964" comment="microcode_ctl-20230808-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3576" version="1" class="patch">
	<metadata>
		<title>enhancement update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This enhancement update provides a functional equivalent of RHEA-2023:6741.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHEA-2023:6741.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053965" comment="aspnetcore-runtime-8.0-8.0.0~rc.2-0.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053966" comment="aspnetcore-targeting-pack-8.0-8.0.0~rc.2-0.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053967" comment="dotnet-apphost-pack-8.0-8.0.0~rc.2-0.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053968" comment="dotnet-host-8.0.0~rc.2-0.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053969" comment="dotnet-hostfxr-8.0-8.0.0~rc.2-0.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053970" comment="dotnet-runtime-8.0-8.0.0~rc.2-0.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053971" comment="dotnet-sdk-8.0-8.0.100~rc.2-0.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053972" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.100~rc.2-0.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053973" comment="dotnet-targeting-pack-8.0-8.0.0~rc.2-0.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053974" comment="dotnet-templates-8.0-8.0.100~rc.2-0.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053975" comment="netstandard-targeting-pack-2.1-8.0.100~rc.2-0.1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3577" version="1" class="patch">
	<metadata>
		<title>enhancement update for redis (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-41056" ref_url="https://www.suse.com/security/cve/CVE-2023-41056/" source="CVE"/>
		<description>
This enhancement update provides a functional equivalent of RHEA-2024:1143.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHEA-2024:1143.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41056/">CVE-2023-41056 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41056">CVE-2023-41056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053976" comment="redis-7.0.12-2.module+el9.3.0+21263+4e58afe8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053977" comment="redis-devel-7.0.12-2.module+el9.3.0+21263+4e58afe8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053978" comment="redis-doc-7.0.12-2.module+el9.3.0+21263+4e58afe8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3578" version="1" class="patch">
	<metadata>
		<title>enhancement update for microcode_ctl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-22655" ref_url="https://www.suse.com/security/cve/CVE-2023-22655/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-38575" ref_url="https://www.suse.com/security/cve/CVE-2023-38575/" source="CVE"/>
		<reference ref_id="CVE-2023-39368" ref_url="https://www.suse.com/security/cve/CVE-2023-39368/" source="CVE"/>
		<reference ref_id="CVE-2023-43490" ref_url="https://www.suse.com/security/cve/CVE-2023-43490/" source="CVE"/>
		<reference ref_id="CVE-2023-45733" ref_url="https://www.suse.com/security/cve/CVE-2023-45733/" source="CVE"/>
		<reference ref_id="CVE-2023-46103" ref_url="https://www.suse.com/security/cve/CVE-2023-46103/" source="CVE"/>
		<description>
This enhancement update provides a functional equivalent of RHEA-2024:7620.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHEA-2024:7620.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22655/">CVE-2023-22655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38575/">CVE-2023-38575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39368/">CVE-2023-39368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-43490/">CVE-2023-43490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45733/">CVE-2023-45733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46103/">CVE-2023-46103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053979" comment="microcode_ctl-20230808-2.20240531.1.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3579" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1728.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1728.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804134" comment="java-11-openjdk-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804135" comment="java-11-openjdk-demo-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804136" comment="java-11-openjdk-demo-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804137" comment="java-11-openjdk-demo-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804138" comment="java-11-openjdk-devel-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804139" comment="java-11-openjdk-devel-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804140" comment="java-11-openjdk-devel-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804141" comment="java-11-openjdk-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804142" comment="java-11-openjdk-headless-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804143" comment="java-11-openjdk-headless-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804144" comment="java-11-openjdk-headless-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804145" comment="java-11-openjdk-javadoc-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804146" comment="java-11-openjdk-javadoc-zip-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804147" comment="java-11-openjdk-jmods-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804148" comment="java-11-openjdk-jmods-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804149" comment="java-11-openjdk-jmods-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804150" comment="java-11-openjdk-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804151" comment="java-11-openjdk-src-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804152" comment="java-11-openjdk-src-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804153" comment="java-11-openjdk-src-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804154" comment="java-11-openjdk-static-libs-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804155" comment="java-11-openjdk-static-libs-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804156" comment="java-11-openjdk-static-libs-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3580" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21449" ref_url="https://www.suse.com/security/cve/CVE-2022-21449/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1729.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1729.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21449/">CVE-2022-21449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21449">CVE-2022-21449 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804157" comment="java-17-openjdk-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804158" comment="java-17-openjdk-demo-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804159" comment="java-17-openjdk-demo-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804160" comment="java-17-openjdk-demo-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804161" comment="java-17-openjdk-devel-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804162" comment="java-17-openjdk-devel-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804163" comment="java-17-openjdk-devel-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804164" comment="java-17-openjdk-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804165" comment="java-17-openjdk-headless-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804166" comment="java-17-openjdk-headless-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804167" comment="java-17-openjdk-headless-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804168" comment="java-17-openjdk-javadoc-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804169" comment="java-17-openjdk-javadoc-zip-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804170" comment="java-17-openjdk-jmods-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804171" comment="java-17-openjdk-jmods-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804172" comment="java-17-openjdk-jmods-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804173" comment="java-17-openjdk-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804174" comment="java-17-openjdk-src-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804175" comment="java-17-openjdk-src-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804176" comment="java-17-openjdk-src-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804177" comment="java-17-openjdk-static-libs-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804178" comment="java-17-openjdk-static-libs-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804179" comment="java-17-openjdk-static-libs-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3581" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2137.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2137.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804180" comment="java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804181" comment="java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804182" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804183" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804184" comment="java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804185" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804186" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804187" comment="java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804188" comment="java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804189" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804190" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804191" comment="java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804193" comment="java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804194" comment="java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804195" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804196" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3582" version="1" class="patch">
	<metadata>
		<title>security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4582.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4582.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804197" comment="gzip-1.10-9.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3583" version="1" class="patch">
	<metadata>
		<title>security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4584.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4584.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804198" comment="zlib-1.2.11-31.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804199" comment="zlib-devel-1.2.11-31.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804200" comment="zlib-static-1.2.11-31.el9_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3584" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-29970" ref_url="https://www.suse.com/security/cve/CVE-2022-29970/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4587.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4587.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29970/">CVE-2022-29970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29970">CVE-2022-29970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804201" comment="pcs-0.11.1-10.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804202" comment="pcs-snmp-0.11.1-10.el9_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3585" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-23267" ref_url="https://www.suse.com/security/cve/CVE-2022-23267/" source="CVE"/>
		<reference ref_id="CVE-2022-29117" ref_url="https://www.suse.com/security/cve/CVE-2022-29117/" source="CVE"/>
		<reference ref_id="CVE-2022-29145" ref_url="https://www.suse.com/security/cve/CVE-2022-29145/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4588.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4588.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23267/">CVE-2022-23267 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23267">CVE-2022-23267 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29117/">CVE-2022-29117 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29117">CVE-2022-29117 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29145/">CVE-2022-29145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29145">CVE-2022-29145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804203" comment="aspnetcore-runtime-6.0-6.0.5-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804204" comment="aspnetcore-targeting-pack-6.0-6.0.5-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804205" comment="dotnet-apphost-pack-6.0-6.0.5-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804206" comment="dotnet-host-6.0.5-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804207" comment="dotnet-hostfxr-6.0-6.0.5-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804208" comment="dotnet-runtime-6.0-6.0.5-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804209" comment="dotnet-sdk-6.0-6.0.105-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804210" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.105-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804211" comment="dotnet-targeting-pack-6.0-6.0.5-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804212" comment="dotnet-templates-6.0-6.0.105-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804213" comment="netstandard-targeting-pack-2.1-6.0.105-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3586" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1520" ref_url="https://www.suse.com/security/cve/CVE-2022-1520/" source="CVE"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29913" ref_url="https://www.suse.com/security/cve/CVE-2022-29913/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4589.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4589.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1520/">CVE-2022-1520 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1520">CVE-2022-1520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29913/">CVE-2022-29913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29913">CVE-2022-29913 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804214" comment="thunderbird-91.9.0-3.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3587" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4590.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4590.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804215" comment="firefox-91.9.0-1.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3588" version="1" class="patch">
	<metadata>
		<title>security update for subversion (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-24070" ref_url="https://www.suse.com/security/cve/CVE-2022-24070/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4591.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4591.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24070/">CVE-2022-24070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24070">CVE-2022-24070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804216" comment="mod_dav_svn-1.14.1-5.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804217" comment="python3-subversion-1.14.1-5.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804218" comment="subversion-1.14.1-5.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804219" comment="subversion-devel-1.14.1-5.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804220" comment="subversion-gnome-1.14.1-5.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804221" comment="subversion-libs-1.14.1-5.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804222" comment="subversion-perl-1.14.1-5.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804223" comment="subversion-tools-1.14.1-5.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3589" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4592.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4592.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804224" comment="rsync-3.2.3-9.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804225" comment="rsync-daemon-3.2.3-9.el9_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3590" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4765.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4765.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804226" comment="firefox-91.9.1-1.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3591" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4771.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4771.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804227" comment="postgresql-13.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804228" comment="postgresql-contrib-13.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804229" comment="postgresql-plperl-13.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804230" comment="postgresql-plpython3-13.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804231" comment="postgresql-pltcl-13.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804232" comment="postgresql-private-devel-13.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804233" comment="postgresql-private-libs-13.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804234" comment="postgresql-server-13.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804235" comment="postgresql-server-devel-13.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804236" comment="postgresql-test-13.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804237" comment="postgresql-upgrade-13.7-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3592" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4772.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4772.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804238" comment="thunderbird-91.9.1-1.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3593" version="1" class="patch">
	<metadata>
		<title>security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4795.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4795.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24903">CVE-2022-24903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804239" comment="rsyslog-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804240" comment="rsyslog-crypto-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804241" comment="rsyslog-doc-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804242" comment="rsyslog-elasticsearch-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804243" comment="rsyslog-gnutls-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804244" comment="rsyslog-gssapi-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804245" comment="rsyslog-kafka-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804246" comment="rsyslog-logrotate-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804247" comment="rsyslog-mmaudit-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804248" comment="rsyslog-mmfields-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804249" comment="rsyslog-mmjsonparse-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804250" comment="rsyslog-mmkubernetes-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804251" comment="rsyslog-mmnormalize-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804252" comment="rsyslog-mmsnmptrapd-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804253" comment="rsyslog-mysql-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804254" comment="rsyslog-omamqp1-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804255" comment="rsyslog-openssl-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804256" comment="rsyslog-pgsql-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804257" comment="rsyslog-relp-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804258" comment="rsyslog-snmp-8.2102.0-101.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804259" comment="rsyslog-udpspoof-8.2102.0-101.el9_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3594" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4873.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4873.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804260" comment="firefox-91.10.0-1.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3595" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1834" ref_url="https://www.suse.com/security/cve/CVE-2022-1834/" source="CVE"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4892.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4892.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1834/">CVE-2022-1834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1834">CVE-2022-1834 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804261" comment="thunderbird-91.10.0-1.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3596" version="1" class="patch">
	<metadata>
		<title>security update for compat-openssl11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4899.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4899.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804262" comment="compat-openssl11-1.1.1k-4.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3597" version="1" class="patch">
	<metadata>
		<title>security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4940.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4940.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804263" comment="xz-5.2.5-8.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804264" comment="xz-devel-5.2.5-8.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804265" comment="xz-libs-5.2.5-8.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804266" comment="xz-lzma-compat-5.2.5-8.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3598" version="1" class="patch">
	<metadata>
		<title>security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-26691" ref_url="https://www.suse.com/security/cve/CVE-2022-26691/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4990.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4990.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26691/">CVE-2022-26691 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26691">CVE-2022-26691 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804267" comment="cups-2.3.3op2-13.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804268" comment="cups-client-2.3.3op2-13.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804269" comment="cups-devel-2.3.3op2-13.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804270" comment="cups-filesystem-2.3.3op2-13.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804271" comment="cups-ipptool-2.3.3op2-13.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804272" comment="cups-libs-2.3.3op2-13.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804273" comment="cups-lpd-2.3.3op2-13.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804274" comment="cups-printerapp-2.3.3op2-13.el9_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3599" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-30184" ref_url="https://www.suse.com/security/cve/CVE-2022-30184/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5050.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5050.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-30184/">CVE-2022-30184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30184">CVE-2022-30184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804275" comment="aspnetcore-runtime-6.0-6.0.6-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804276" comment="aspnetcore-targeting-pack-6.0-6.0.6-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804277" comment="dotnet-apphost-pack-6.0-6.0.6-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804278" comment="dotnet-host-6.0.6-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804279" comment="dotnet-hostfxr-6.0-6.0.6-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804280" comment="dotnet-runtime-6.0-6.0.6-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804281" comment="dotnet-sdk-6.0-6.0.106-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804282" comment="dotnet-targeting-pack-6.0-6.0.6-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804283" comment="dotnet-templates-6.0-6.0.106-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804284" comment="netstandard-targeting-pack-2.1-6.0.106-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3600" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-0554" ref_url="https://www.suse.com/security/cve/CVE-2022-0554/" source="CVE"/>
		<reference ref_id="CVE-2022-0943" ref_url="https://www.suse.com/security/cve/CVE-2022-0943/" source="CVE"/>
		<reference ref_id="CVE-2022-1154" ref_url="https://www.suse.com/security/cve/CVE-2022-1154/" source="CVE"/>
		<reference ref_id="CVE-2022-1420" ref_url="https://www.suse.com/security/cve/CVE-2022-1420/" source="CVE"/>
		<reference ref_id="CVE-2022-1621" ref_url="https://www.suse.com/security/cve/CVE-2022-1621/" source="CVE"/>
		<reference ref_id="CVE-2022-1629" ref_url="https://www.suse.com/security/cve/CVE-2022-1629/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5242.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5242.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0554/">CVE-2022-0554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">CVE-2022-0554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0943/">CVE-2022-0943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">CVE-2022-0943 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1154/">CVE-2022-1154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">CVE-2022-1154 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1420/">CVE-2022-1420 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">CVE-2022-1420 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1621/">CVE-2022-1621 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">CVE-2022-1621 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1629/">CVE-2022-1629 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">CVE-2022-1629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804285" comment="vim-X11-8.2.2637-16.el9_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804286" comment="vim-common-8.2.2637-16.el9_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804287" comment="vim-enhanced-8.2.2637-16.el9_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804288" comment="vim-filesystem-8.2.2637-16.el9_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804289" comment="vim-minimal-8.2.2637-16.el9_0.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3601" version="1" class="patch">
	<metadata>
		<title>security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5244.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5244.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804290" comment="expat-2.2.10-12.el9_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804291" comment="expat-devel-2.2.10-12.el9_0.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3602" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-22576" ref_url="https://www.suse.com/security/cve/CVE-2022-22576/" source="CVE"/>
		<reference ref_id="CVE-2022-27774" ref_url="https://www.suse.com/security/cve/CVE-2022-27774/" source="CVE"/>
		<reference ref_id="CVE-2022-27776" ref_url="https://www.suse.com/security/cve/CVE-2022-27776/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5245.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5245.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22576/">CVE-2022-22576 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">CVE-2022-22576 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27774/">CVE-2022-27774 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27774">CVE-2022-27774 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27776/">CVE-2022-27776 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">CVE-2022-27776 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804292" comment="curl-7.76.1-14.el9_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804293" comment="curl-minimal-7.76.1-14.el9_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804294" comment="libcurl-7.76.1-14.el9_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804295" comment="libcurl-devel-7.76.1-14.el9_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804296" comment="libcurl-minimal-7.76.1-14.el9_0.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3603" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1012" ref_url="https://www.suse.com/security/cve/CVE-2022-1012/" source="CVE"/>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-1966" ref_url="https://www.suse.com/security/cve/CVE-2022-1966/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="CVE-2022-32250" ref_url="https://www.suse.com/security/cve/CVE-2022-32250/" source="CVE"/>
		<reference ref_id="CVE-2022-49044" ref_url="https://www.suse.com/security/cve/CVE-2022-49044/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5249.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5249.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1012/">CVE-2022-1012 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1012">CVE-2022-1012 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1966/">CVE-2022-1966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1966">CVE-2022-1966 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27666">CVE-2022-27666 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32250/">CVE-2022-32250 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32250">CVE-2022-32250 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49044/">CVE-2022-49044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49044">CVE-2022-49044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804297" comment="bpftool-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804298" comment="kernel-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804299" comment="kernel-abi-stablelists-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804300" comment="kernel-core-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804301" comment="kernel-cross-headers-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804302" comment="kernel-debug-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804303" comment="kernel-debug-core-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804306" comment="kernel-debug-modules-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804307" comment="kernel-debug-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804310" comment="kernel-doc-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804311" comment="kernel-headers-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804312" comment="kernel-modules-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804313" comment="kernel-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804314" comment="kernel-tools-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804315" comment="kernel-tools-libs-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804317" comment="perf-5.14.0-70.17.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804318" comment="python3-perf-5.14.0-70.17.1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3604" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5250.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5250.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804319" comment="libxml2-2.9.13-1.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804320" comment="libxml2-devel-2.9.13-1.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804321" comment="python3-libxml2-2.9.13-1.el9_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3605" version="1" class="patch">
	<metadata>
		<title>security update for pcre2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<reference ref_id="CVE-2022-1587" ref_url="https://www.suse.com/security/cve/CVE-2022-1587/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5251.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5251.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1587/">CVE-2022-1587 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">CVE-2022-1587 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804322" comment="pcre2-10.37-5.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804323" comment="pcre2-devel-10.37-5.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804324" comment="pcre2-syntax-10.37-5.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804325" comment="pcre2-utf16-10.37-5.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804326" comment="pcre2-utf32-10.37-5.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3606" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-26280" ref_url="https://www.suse.com/security/cve/CVE-2022-26280/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5252.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5252.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26280/">CVE-2022-26280 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26280">CVE-2022-26280 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804327" comment="bsdtar-3.5.3-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804328" comment="libarchive-3.5.3-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804329" comment="libarchive-devel-3.5.3-2.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3607" version="1" class="patch">
	<metadata>
		<title>security update for libinput (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1215" ref_url="https://www.suse.com/security/cve/CVE-2022-1215/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5257.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5257.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1215/">CVE-2022-1215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1215">CVE-2022-1215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804330" comment="libinput-1.19.3-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804331" comment="libinput-devel-1.19.3-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804332" comment="libinput-utils-1.19.3-2.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3608" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-26353" ref_url="https://www.suse.com/security/cve/CVE-2022-26353/" source="CVE"/>
		<reference ref_id="CVE-2022-26354" ref_url="https://www.suse.com/security/cve/CVE-2022-26354/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5263.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5263.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26353/">CVE-2022-26353 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26353">CVE-2022-26353 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-26354/">CVE-2022-26354 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26354">CVE-2022-26354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982264" comment="qemu-guest-agent-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982265" comment="qemu-img-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982266" comment="qemu-kvm-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982267" comment="qemu-kvm-audio-pa-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982268" comment="qemu-kvm-block-curl-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982269" comment="qemu-kvm-block-rbd-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982270" comment="qemu-kvm-common-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982271" comment="qemu-kvm-core-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982272" comment="qemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982273" comment="qemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982274" comment="qemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982275" comment="qemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982276" comment="qemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982277" comment="qemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982278" comment="qemu-kvm-device-usb-host-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982279" comment="qemu-kvm-device-usb-redirect-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982280" comment="qemu-kvm-docs-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982281" comment="qemu-kvm-tools-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982282" comment="qemu-kvm-ui-egl-headless-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982283" comment="qemu-kvm-ui-opengl-6.2.0-11.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982284" comment="qemu-pr-helper-6.2.0-11.el9_0.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3609" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5481.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5481.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804333" comment="firefox-91.11.0-2.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3610" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-2226" ref_url="https://www.suse.com/security/cve/CVE-2022-2226/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5482.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5482.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2226/">CVE-2022-2226 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2226">CVE-2022-2226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804334" comment="thunderbird-91.11.0-2.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3611" version="1" class="patch">
	<metadata>
		<title>security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-46784" ref_url="https://www.suse.com/security/cve/CVE-2021-46784/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5527.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5527.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46784/">CVE-2021-46784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46784">CVE-2021-46784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804335" comment="squid-5.2-1.el9_0.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3612" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5695.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5695.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804336" comment="java-11-openjdk-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804337" comment="java-11-openjdk-demo-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804338" comment="java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804339" comment="java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804340" comment="java-11-openjdk-devel-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804341" comment="java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804342" comment="java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804343" comment="java-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804344" comment="java-11-openjdk-headless-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804345" comment="java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804346" comment="java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804347" comment="java-11-openjdk-javadoc-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804348" comment="java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804349" comment="java-11-openjdk-jmods-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804350" comment="java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804351" comment="java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804352" comment="java-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804353" comment="java-11-openjdk-src-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804354" comment="java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804355" comment="java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804356" comment="java-11-openjdk-static-libs-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804357" comment="java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804358" comment="java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3613" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5709.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5709.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804359" comment="java-1.8.0-openjdk-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804360" comment="java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804361" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804362" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804363" comment="java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804364" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804365" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804366" comment="java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804367" comment="java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804368" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804369" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804370" comment="java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804371" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804372" comment="java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804373" comment="java-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804374" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804375" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3614" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-31107" ref_url="https://www.suse.com/security/cve/CVE-2022-31107/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5716.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5716.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31107/">CVE-2022-31107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31107">CVE-2022-31107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804376" comment="grafana-7.5.11-5.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3615" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5736.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5736.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21549">CVE-2022-21549 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804377" comment="java-17-openjdk-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804378" comment="java-17-openjdk-demo-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804379" comment="java-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804380" comment="java-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804381" comment="java-17-openjdk-devel-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804382" comment="java-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804383" comment="java-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804384" comment="java-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804385" comment="java-17-openjdk-headless-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804386" comment="java-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804387" comment="java-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804388" comment="java-17-openjdk-javadoc-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804389" comment="java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804390" comment="java-17-openjdk-jmods-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804391" comment="java-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804392" comment="java-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804393" comment="java-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804394" comment="java-17-openjdk-src-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804395" comment="java-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804396" comment="java-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804397" comment="java-17-openjdk-static-libs-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804398" comment="java-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804399" comment="java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3616" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5767.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5767.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804400" comment="firefox-91.12.0-2.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3617" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5778.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5778.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804401" comment="thunderbird-91.12.0-1.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3618" version="1" class="patch">
	<metadata>
		<title>security update for go-toolset (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962/" source="CVE"/>
		<reference ref_id="CVE-2022-24675" ref_url="https://www.suse.com/security/cve/CVE-2022-24675/" source="CVE"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="CVE-2022-28131" ref_url="https://www.suse.com/security/cve/CVE-2022-28131/" source="CVE"/>
		<reference ref_id="CVE-2022-28327" ref_url="https://www.suse.com/security/cve/CVE-2022-28327/" source="CVE"/>
		<reference ref_id="CVE-2022-29526" ref_url="https://www.suse.com/security/cve/CVE-2022-29526/" source="CVE"/>
		<reference ref_id="CVE-2022-30629" ref_url="https://www.suse.com/security/cve/CVE-2022-30629/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30633" ref_url="https://www.suse.com/security/cve/CVE-2022-30633/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5799.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5799.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24675/">CVE-2022-24675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24921">CVE-2022-24921 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28131/">CVE-2022-28131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28327/">CVE-2022-28327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28327">CVE-2022-28327 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29526/">CVE-2022-29526 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30629/">CVE-2022-30629 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30629">CVE-2022-30629 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30633/">CVE-2022-30633 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3619" version="1" class="patch">
	<metadata>
		<title>security update for php (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-31626" ref_url="https://www.suse.com/security/cve/CVE-2022-31626/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5904.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5904.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31626/">CVE-2022-31626 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31626">CVE-2022-31626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804410" comment="php-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804411" comment="php-bcmath-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804412" comment="php-cli-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804413" comment="php-common-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804414" comment="php-dba-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804415" comment="php-dbg-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804416" comment="php-devel-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804417" comment="php-embedded-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804418" comment="php-enchant-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804419" comment="php-ffi-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804420" comment="php-fpm-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804421" comment="php-gd-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804422" comment="php-gmp-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804423" comment="php-intl-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804424" comment="php-ldap-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804425" comment="php-mbstring-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804426" comment="php-mysqlnd-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804427" comment="php-odbc-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804428" comment="php-opcache-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804429" comment="php-pdo-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804430" comment="php-pgsql-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804431" comment="php-process-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804432" comment="php-snmp-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804433" comment="php-soap-8.0.13-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804434" comment="php-xml-8.0.13-2.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3620" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1785" ref_url="https://www.suse.com/security/cve/CVE-2022-1785/" source="CVE"/>
		<reference ref_id="CVE-2022-1897" ref_url="https://www.suse.com/security/cve/CVE-2022-1897/" source="CVE"/>
		<reference ref_id="CVE-2022-1927" ref_url="https://www.suse.com/security/cve/CVE-2022-1927/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5942.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5942.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1785/">CVE-2022-1785 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">CVE-2022-1785 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1897/">CVE-2022-1897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1897">CVE-2022-1897 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1927/">CVE-2022-1927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1927">CVE-2022-1927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804435" comment="vim-X11-8.2.2637-16.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804436" comment="vim-common-8.2.2637-16.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804437" comment="vim-enhanced-8.2.2637-16.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804438" comment="vim-filesystem-8.2.2637-16.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804439" comment="vim-minimal-8.2.2637-16.el9_0.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3621" version="1" class="patch">
	<metadata>
		<title>security update for galera (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-46659" ref_url="https://www.suse.com/security/cve/CVE-2021-46659/" source="CVE"/>
		<reference ref_id="CVE-2021-46661" ref_url="https://www.suse.com/security/cve/CVE-2021-46661/" source="CVE"/>
		<reference ref_id="CVE-2021-46663" ref_url="https://www.suse.com/security/cve/CVE-2021-46663/" source="CVE"/>
		<reference ref_id="CVE-2021-46664" ref_url="https://www.suse.com/security/cve/CVE-2021-46664/" source="CVE"/>
		<reference ref_id="CVE-2021-46665" ref_url="https://www.suse.com/security/cve/CVE-2021-46665/" source="CVE"/>
		<reference ref_id="CVE-2021-46668" ref_url="https://www.suse.com/security/cve/CVE-2021-46668/" source="CVE"/>
		<reference ref_id="CVE-2021-46669" ref_url="https://www.suse.com/security/cve/CVE-2021-46669/" source="CVE"/>
		<reference ref_id="CVE-2022-21595" ref_url="https://www.suse.com/security/cve/CVE-2022-21595/" source="CVE"/>
		<reference ref_id="CVE-2022-24048" ref_url="https://www.suse.com/security/cve/CVE-2022-24048/" source="CVE"/>
		<reference ref_id="CVE-2022-24050" ref_url="https://www.suse.com/security/cve/CVE-2022-24050/" source="CVE"/>
		<reference ref_id="CVE-2022-24051" ref_url="https://www.suse.com/security/cve/CVE-2022-24051/" source="CVE"/>
		<reference ref_id="CVE-2022-24052" ref_url="https://www.suse.com/security/cve/CVE-2022-24052/" source="CVE"/>
		<reference ref_id="CVE-2022-27376" ref_url="https://www.suse.com/security/cve/CVE-2022-27376/" source="CVE"/>
		<reference ref_id="CVE-2022-27377" ref_url="https://www.suse.com/security/cve/CVE-2022-27377/" source="CVE"/>
		<reference ref_id="CVE-2022-27378" ref_url="https://www.suse.com/security/cve/CVE-2022-27378/" source="CVE"/>
		<reference ref_id="CVE-2022-27379" ref_url="https://www.suse.com/security/cve/CVE-2022-27379/" source="CVE"/>
		<reference ref_id="CVE-2022-27380" ref_url="https://www.suse.com/security/cve/CVE-2022-27380/" source="CVE"/>
		<reference ref_id="CVE-2022-27381" ref_url="https://www.suse.com/security/cve/CVE-2022-27381/" source="CVE"/>
		<reference ref_id="CVE-2022-27382" ref_url="https://www.suse.com/security/cve/CVE-2022-27382/" source="CVE"/>
		<reference ref_id="CVE-2022-27383" ref_url="https://www.suse.com/security/cve/CVE-2022-27383/" source="CVE"/>
		<reference ref_id="CVE-2022-27384" ref_url="https://www.suse.com/security/cve/CVE-2022-27384/" source="CVE"/>
		<reference ref_id="CVE-2022-27386" ref_url="https://www.suse.com/security/cve/CVE-2022-27386/" source="CVE"/>
		<reference ref_id="CVE-2022-27387" ref_url="https://www.suse.com/security/cve/CVE-2022-27387/" source="CVE"/>
		<reference ref_id="CVE-2022-27444" ref_url="https://www.suse.com/security/cve/CVE-2022-27444/" source="CVE"/>
		<reference ref_id="CVE-2022-27445" ref_url="https://www.suse.com/security/cve/CVE-2022-27445/" source="CVE"/>
		<reference ref_id="CVE-2022-27446" ref_url="https://www.suse.com/security/cve/CVE-2022-27446/" source="CVE"/>
		<reference ref_id="CVE-2022-27447" ref_url="https://www.suse.com/security/cve/CVE-2022-27447/" source="CVE"/>
		<reference ref_id="CVE-2022-27448" ref_url="https://www.suse.com/security/cve/CVE-2022-27448/" source="CVE"/>
		<reference ref_id="CVE-2022-27449" ref_url="https://www.suse.com/security/cve/CVE-2022-27449/" source="CVE"/>
		<reference ref_id="CVE-2022-27451" ref_url="https://www.suse.com/security/cve/CVE-2022-27451/" source="CVE"/>
		<reference ref_id="CVE-2022-27452" ref_url="https://www.suse.com/security/cve/CVE-2022-27452/" source="CVE"/>
		<reference ref_id="CVE-2022-27455" ref_url="https://www.suse.com/security/cve/CVE-2022-27455/" source="CVE"/>
		<reference ref_id="CVE-2022-27456" ref_url="https://www.suse.com/security/cve/CVE-2022-27456/" source="CVE"/>
		<reference ref_id="CVE-2022-27457" ref_url="https://www.suse.com/security/cve/CVE-2022-27457/" source="CVE"/>
		<reference ref_id="CVE-2022-27458" ref_url="https://www.suse.com/security/cve/CVE-2022-27458/" source="CVE"/>
		<reference ref_id="CVE-2022-31622" ref_url="https://www.suse.com/security/cve/CVE-2022-31622/" source="CVE"/>
		<reference ref_id="CVE-2022-31623" ref_url="https://www.suse.com/security/cve/CVE-2022-31623/" source="CVE"/>
		<reference ref_id="CVE-2022-32083" ref_url="https://www.suse.com/security/cve/CVE-2022-32083/" source="CVE"/>
		<reference ref_id="CVE-2022-32085" ref_url="https://www.suse.com/security/cve/CVE-2022-32085/" source="CVE"/>
		<reference ref_id="CVE-2022-32086" ref_url="https://www.suse.com/security/cve/CVE-2022-32086/" source="CVE"/>
		<reference ref_id="CVE-2022-32087" ref_url="https://www.suse.com/security/cve/CVE-2022-32087/" source="CVE"/>
		<reference ref_id="CVE-2022-32088" ref_url="https://www.suse.com/security/cve/CVE-2022-32088/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5948.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5948.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46659/">CVE-2021-46659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46659">CVE-2021-46659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46661/">CVE-2021-46661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46661">CVE-2021-46661 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46663/">CVE-2021-46663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46663">CVE-2021-46663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46664/">CVE-2021-46664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46664">CVE-2021-46664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46665/">CVE-2021-46665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46665">CVE-2021-46665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46668/">CVE-2021-46668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46668">CVE-2021-46668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46669/">CVE-2021-46669 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">CVE-2021-46669 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21595/">CVE-2022-21595 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21595">CVE-2022-21595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24048/">CVE-2022-24048 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24048">CVE-2022-24048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24050/">CVE-2022-24050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24050">CVE-2022-24050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24051/">CVE-2022-24051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24051">CVE-2022-24051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24052/">CVE-2022-24052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24052">CVE-2022-24052 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27376/">CVE-2022-27376 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27376">CVE-2022-27376 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27377/">CVE-2022-27377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27377">CVE-2022-27377 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27378/">CVE-2022-27378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27378">CVE-2022-27378 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27379/">CVE-2022-27379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27379">CVE-2022-27379 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27380/">CVE-2022-27380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27380">CVE-2022-27380 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27381/">CVE-2022-27381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27381">CVE-2022-27381 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27382/">CVE-2022-27382 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27382">CVE-2022-27382 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27383/">CVE-2022-27383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27383">CVE-2022-27383 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27384/">CVE-2022-27384 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27384">CVE-2022-27384 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27386/">CVE-2022-27386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27386">CVE-2022-27386 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27387/">CVE-2022-27387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27387">CVE-2022-27387 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27444/">CVE-2022-27444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27444">CVE-2022-27444 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27445/">CVE-2022-27445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27445">CVE-2022-27445 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27446/">CVE-2022-27446 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27446">CVE-2022-27446 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27447/">CVE-2022-27447 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27447">CVE-2022-27447 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27448/">CVE-2022-27448 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27448">CVE-2022-27448 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27449/">CVE-2022-27449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27449">CVE-2022-27449 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27451/">CVE-2022-27451 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27451">CVE-2022-27451 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27452/">CVE-2022-27452 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27452">CVE-2022-27452 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27455/">CVE-2022-27455 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27455">CVE-2022-27455 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27456/">CVE-2022-27456 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27456">CVE-2022-27456 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27457/">CVE-2022-27457 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27457">CVE-2022-27457 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27458/">CVE-2022-27458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27458">CVE-2022-27458 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31622/">CVE-2022-31622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31622">CVE-2022-31622 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31623/">CVE-2022-31623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31623">CVE-2022-31623 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32083/">CVE-2022-32083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32083">CVE-2022-32083 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32085/">CVE-2022-32085 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32085">CVE-2022-32085 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32086/">CVE-2022-32086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32086">CVE-2022-32086 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32087/">CVE-2022-32087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32087">CVE-2022-32087 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32088/">CVE-2022-32088 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32088">CVE-2022-32088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3622" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-0494" ref_url="https://www.suse.com/security/cve/CVE-2022-0494/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-48943" ref_url="https://www.suse.com/security/cve/CVE-2022-48943/" source="CVE"/>
		<reference ref_id="CVE-2022-49418" ref_url="https://www.suse.com/security/cve/CVE-2022-49418/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6003.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6003.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0494/">CVE-2022-0494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0494">CVE-2022-0494 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1055">CVE-2022-1055 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48943/">CVE-2022-48943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48943">CVE-2022-48943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49418/">CVE-2022-49418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49418">CVE-2022-49418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804456" comment="bpftool-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804457" comment="kernel-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804458" comment="kernel-abi-stablelists-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804459" comment="kernel-core-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804460" comment="kernel-cross-headers-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804461" comment="kernel-debug-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804462" comment="kernel-debug-core-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804465" comment="kernel-debug-modules-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804466" comment="kernel-debug-modules-extra-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804469" comment="kernel-doc-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804470" comment="kernel-headers-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804471" comment="kernel-modules-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804472" comment="kernel-modules-extra-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804473" comment="kernel-tools-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804474" comment="kernel-tools-libs-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804476" comment="perf-5.14.0-70.22.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804477" comment="python3-perf-5.14.0-70.22.1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3623" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-34716" ref_url="https://www.suse.com/security/cve/CVE-2022-34716/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6043.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6043.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34716/">CVE-2022-34716 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34716">CVE-2022-34716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804478" comment="aspnetcore-runtime-6.0-6.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804479" comment="aspnetcore-targeting-pack-6.0-6.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804480" comment="dotnet-apphost-pack-6.0-6.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804481" comment="dotnet-host-6.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804482" comment="dotnet-hostfxr-6.0-6.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804483" comment="dotnet-runtime-6.0-6.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804484" comment="dotnet-sdk-6.0-6.0.108-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804485" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804486" comment="dotnet-targeting-pack-6.0-6.0.8-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804487" comment="dotnet-templates-6.0-6.0.108-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804488" comment="netstandard-targeting-pack-2.1-6.0.108-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3624" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-32206" ref_url="https://www.suse.com/security/cve/CVE-2022-32206/" source="CVE"/>
		<reference ref_id="CVE-2022-32207" ref_url="https://www.suse.com/security/cve/CVE-2022-32207/" source="CVE"/>
		<reference ref_id="CVE-2022-32208" ref_url="https://www.suse.com/security/cve/CVE-2022-32208/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6157.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6157.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32206/">CVE-2022-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32206">CVE-2022-32206 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32207/">CVE-2022-32207 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32207">CVE-2022-32207 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32208/">CVE-2022-32208 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32208">CVE-2022-32208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804489" comment="curl-7.76.1-14.el9_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804490" comment="curl-minimal-7.76.1-14.el9_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804491" comment="libcurl-7.76.1-14.el9_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804492" comment="libcurl-devel-7.76.1-14.el9_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804493" comment="libcurl-minimal-7.76.1-14.el9_0.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3625" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6165.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6165.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38476">CVE-2022-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804494" comment="thunderbird-91.13.0-1.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3626" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6174.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6174.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38476">CVE-2022-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804495" comment="firefox-91.13.0-1.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3627" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-29154" ref_url="https://www.suse.com/security/cve/CVE-2022-29154/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6181.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6181.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29154/">CVE-2022-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29154">CVE-2022-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804496" comment="rsync-3.2.3-9.el9_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804497" comment="rsync-daemon-3.2.3-9.el9_0.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3628" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<reference ref_id="CVE-2022-1343" ref_url="https://www.suse.com/security/cve/CVE-2022-1343/" source="CVE"/>
		<reference ref_id="CVE-2022-1473" ref_url="https://www.suse.com/security/cve/CVE-2022-1473/" source="CVE"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<reference ref_id="CVE-2022-2097" ref_url="https://www.suse.com/security/cve/CVE-2022-2097/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6224.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6224.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1343/">CVE-2022-1343 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1343">CVE-2022-1343 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1473/">CVE-2022-1473 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1473">CVE-2022-1473 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2097/">CVE-2022-2097 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2097">CVE-2022-2097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804498" comment="openssl-3.0.1-41.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804499" comment="openssl-devel-3.0.1-41.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804500" comment="openssl-libs-3.0.1-41.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804501" comment="openssl-perl-3.0.1-41.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3629" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2735" ref_url="https://www.suse.com/security/cve/CVE-2022-2735/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6313.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6313.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2735/">CVE-2022-2735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2735">CVE-2022-2735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804502" comment="pcs-0.11.1-10.el9_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804503" comment="pcs-snmp-0.11.1-10.el9_0.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3630" version="1" class="patch">
	<metadata>
		<title>security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-31676" ref_url="https://www.suse.com/security/cve/CVE-2022-31676/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6358.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6358.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31676/">CVE-2022-31676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31676">CVE-2022-31676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804504" comment="open-vm-tools-11.3.5-1.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804505" comment="open-vm-tools-desktop-11.3.5-1.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804506" comment="open-vm-tools-sdmp-11.3.5-1.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804507" comment="open-vm-tools-test-11.3.5-1.el9_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3631" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-38013" ref_url="https://www.suse.com/security/cve/CVE-2022-38013/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6521.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6521.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38013/">CVE-2022-38013 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38013">CVE-2022-38013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804508" comment="aspnetcore-runtime-6.0-6.0.9-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804509" comment="aspnetcore-targeting-pack-6.0-6.0.9-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804510" comment="dotnet-apphost-pack-6.0-6.0.9-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804511" comment="dotnet-host-6.0.9-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804512" comment="dotnet-hostfxr-6.0-6.0.9-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804513" comment="dotnet-runtime-6.0-6.0.9-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804514" comment="dotnet-sdk-6.0-6.0.109-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804515" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.109-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804516" comment="dotnet-targeting-pack-6.0-6.0.9-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804517" comment="dotnet-templates-6.0-6.0.109-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804518" comment="netstandard-targeting-pack-2.1-6.0.109-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3632" version="1" class="patch">
	<metadata>
		<title>security update for booth (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2553" ref_url="https://www.suse.com/security/cve/CVE-2022-2553/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6580.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6580.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2553/">CVE-2022-2553 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2553">CVE-2022-2553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804519" comment="booth-1.0-251.3.bfb2f92.git.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804520" comment="booth-arbitrator-1.0-251.3.bfb2f92.git.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804521" comment="booth-core-1.0-251.3.bfb2f92.git.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804522" comment="booth-site-1.0-251.3.bfb2f92.git.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804523" comment="booth-test-1.0-251.3.bfb2f92.git.el9_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3633" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-28738" ref_url="https://www.suse.com/security/cve/CVE-2022-28738/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6585.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6585.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-28738/">CVE-2022-28738 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28738">CVE-2022-28738 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804524" comment="ruby-3.0.4-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804525" comment="ruby-default-gems-3.0.4-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804526" comment="ruby-devel-3.0.4-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804527" comment="ruby-doc-3.0.4-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804528" comment="ruby-libs-3.0.4-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804529" comment="rubygem-bigdecimal-3.0.0-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804530" comment="rubygem-bundler-2.2.33-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804531" comment="rubygem-io-console-0.5.7-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804532" comment="rubygem-irb-1.3.5-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804533" comment="rubygem-json-2.5.1-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804534" comment="rubygem-minitest-5.14.2-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804535" comment="rubygem-power_assert-1.2.0-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804536" comment="rubygem-psych-3.3.2-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804537" comment="rubygem-rake-13.0.3-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804538" comment="rubygem-rbs-1.4.0-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804539" comment="rubygem-rdoc-6.3.3-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804540" comment="rubygem-rexml-3.2.5-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804541" comment="rubygem-rss-0.2.9-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804542" comment="rubygem-test-unit-3.3.7-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804543" comment="rubygem-typeprof-0.15.2-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804544" comment="rubygems-3.2.33-160.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804545" comment="rubygems-devel-3.2.33-160.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3634" version="1" class="patch">
	<metadata>
		<title>security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-21412" ref_url="https://www.suse.com/security/cve/CVE-2022-21412/" source="CVE"/>
		<reference ref_id="CVE-2022-21413" ref_url="https://www.suse.com/security/cve/CVE-2022-21413/" source="CVE"/>
		<reference ref_id="CVE-2022-21414" ref_url="https://www.suse.com/security/cve/CVE-2022-21414/" source="CVE"/>
		<reference ref_id="CVE-2022-21415" ref_url="https://www.suse.com/security/cve/CVE-2022-21415/" source="CVE"/>
		<reference ref_id="CVE-2022-21417" ref_url="https://www.suse.com/security/cve/CVE-2022-21417/" source="CVE"/>
		<reference ref_id="CVE-2022-21418" ref_url="https://www.suse.com/security/cve/CVE-2022-21418/" source="CVE"/>
		<reference ref_id="CVE-2022-21423" ref_url="https://www.suse.com/security/cve/CVE-2022-21423/" source="CVE"/>
		<reference ref_id="CVE-2022-21425" ref_url="https://www.suse.com/security/cve/CVE-2022-21425/" source="CVE"/>
		<reference ref_id="CVE-2022-21427" ref_url="https://www.suse.com/security/cve/CVE-2022-21427/" source="CVE"/>
		<reference ref_id="CVE-2022-21435" ref_url="https://www.suse.com/security/cve/CVE-2022-21435/" source="CVE"/>
		<reference ref_id="CVE-2022-21436" ref_url="https://www.suse.com/security/cve/CVE-2022-21436/" source="CVE"/>
		<reference ref_id="CVE-2022-21437" ref_url="https://www.suse.com/security/cve/CVE-2022-21437/" source="CVE"/>
		<reference ref_id="CVE-2022-21438" ref_url="https://www.suse.com/security/cve/CVE-2022-21438/" source="CVE"/>
		<reference ref_id="CVE-2022-21440" ref_url="https://www.suse.com/security/cve/CVE-2022-21440/" source="CVE"/>
		<reference ref_id="CVE-2022-21444" ref_url="https://www.suse.com/security/cve/CVE-2022-21444/" source="CVE"/>
		<reference ref_id="CVE-2022-21451" ref_url="https://www.suse.com/security/cve/CVE-2022-21451/" source="CVE"/>
		<reference ref_id="CVE-2022-21452" ref_url="https://www.suse.com/security/cve/CVE-2022-21452/" source="CVE"/>
		<reference ref_id="CVE-2022-21454" ref_url="https://www.suse.com/security/cve/CVE-2022-21454/" source="CVE"/>
		<reference ref_id="CVE-2022-21455" ref_url="https://www.suse.com/security/cve/CVE-2022-21455/" source="CVE"/>
		<reference ref_id="CVE-2022-21457" ref_url="https://www.suse.com/security/cve/CVE-2022-21457/" source="CVE"/>
		<reference ref_id="CVE-2022-21459" ref_url="https://www.suse.com/security/cve/CVE-2022-21459/" source="CVE"/>
		<reference ref_id="CVE-2022-21460" ref_url="https://www.suse.com/security/cve/CVE-2022-21460/" source="CVE"/>
		<reference ref_id="CVE-2022-21462" ref_url="https://www.suse.com/security/cve/CVE-2022-21462/" source="CVE"/>
		<reference ref_id="CVE-2022-21478" ref_url="https://www.suse.com/security/cve/CVE-2022-21478/" source="CVE"/>
		<reference ref_id="CVE-2022-21479" ref_url="https://www.suse.com/security/cve/CVE-2022-21479/" source="CVE"/>
		<reference ref_id="CVE-2022-21509" ref_url="https://www.suse.com/security/cve/CVE-2022-21509/" source="CVE"/>
		<reference ref_id="CVE-2022-21515" ref_url="https://www.suse.com/security/cve/CVE-2022-21515/" source="CVE"/>
		<reference ref_id="CVE-2022-21517" ref_url="https://www.suse.com/security/cve/CVE-2022-21517/" source="CVE"/>
		<reference ref_id="CVE-2022-21522" ref_url="https://www.suse.com/security/cve/CVE-2022-21522/" source="CVE"/>
		<reference ref_id="CVE-2022-21525" ref_url="https://www.suse.com/security/cve/CVE-2022-21525/" source="CVE"/>
		<reference ref_id="CVE-2022-21526" ref_url="https://www.suse.com/security/cve/CVE-2022-21526/" source="CVE"/>
		<reference ref_id="CVE-2022-21527" ref_url="https://www.suse.com/security/cve/CVE-2022-21527/" source="CVE"/>
		<reference ref_id="CVE-2022-21528" ref_url="https://www.suse.com/security/cve/CVE-2022-21528/" source="CVE"/>
		<reference ref_id="CVE-2022-21529" ref_url="https://www.suse.com/security/cve/CVE-2022-21529/" source="CVE"/>
		<reference ref_id="CVE-2022-21530" ref_url="https://www.suse.com/security/cve/CVE-2022-21530/" source="CVE"/>
		<reference ref_id="CVE-2022-21531" ref_url="https://www.suse.com/security/cve/CVE-2022-21531/" source="CVE"/>
		<reference ref_id="CVE-2022-21534" ref_url="https://www.suse.com/security/cve/CVE-2022-21534/" source="CVE"/>
		<reference ref_id="CVE-2022-21537" ref_url="https://www.suse.com/security/cve/CVE-2022-21537/" source="CVE"/>
		<reference ref_id="CVE-2022-21538" ref_url="https://www.suse.com/security/cve/CVE-2022-21538/" source="CVE"/>
		<reference ref_id="CVE-2022-21539" ref_url="https://www.suse.com/security/cve/CVE-2022-21539/" source="CVE"/>
		<reference ref_id="CVE-2022-21547" ref_url="https://www.suse.com/security/cve/CVE-2022-21547/" source="CVE"/>
		<reference ref_id="CVE-2022-21553" ref_url="https://www.suse.com/security/cve/CVE-2022-21553/" source="CVE"/>
		<reference ref_id="CVE-2022-21556" ref_url="https://www.suse.com/security/cve/CVE-2022-21556/" source="CVE"/>
		<reference ref_id="CVE-2022-21569" ref_url="https://www.suse.com/security/cve/CVE-2022-21569/" source="CVE"/>
		<reference ref_id="CVE-2022-21592" ref_url="https://www.suse.com/security/cve/CVE-2022-21592/" source="CVE"/>
		<reference ref_id="CVE-2022-21605" ref_url="https://www.suse.com/security/cve/CVE-2022-21605/" source="CVE"/>
		<reference ref_id="CVE-2022-21607" ref_url="https://www.suse.com/security/cve/CVE-2022-21607/" source="CVE"/>
		<reference ref_id="CVE-2022-21635" ref_url="https://www.suse.com/security/cve/CVE-2022-21635/" source="CVE"/>
		<reference ref_id="CVE-2022-21638" ref_url="https://www.suse.com/security/cve/CVE-2022-21638/" source="CVE"/>
		<reference ref_id="CVE-2022-21641" ref_url="https://www.suse.com/security/cve/CVE-2022-21641/" source="CVE"/>
		<reference ref_id="CVE-2023-21866" ref_url="https://www.suse.com/security/cve/CVE-2023-21866/" source="CVE"/>
		<reference ref_id="CVE-2023-21872" ref_url="https://www.suse.com/security/cve/CVE-2023-21872/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6590.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6590.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21412/">CVE-2022-21412 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21412">CVE-2022-21412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21413/">CVE-2022-21413 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21413">CVE-2022-21413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21414/">CVE-2022-21414 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21414">CVE-2022-21414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21415/">CVE-2022-21415 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21415">CVE-2022-21415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21417/">CVE-2022-21417 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21417">CVE-2022-21417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21418/">CVE-2022-21418 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21418">CVE-2022-21418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21423/">CVE-2022-21423 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21423">CVE-2022-21423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21425/">CVE-2022-21425 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21425">CVE-2022-21425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21427/">CVE-2022-21427 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21427">CVE-2022-21427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21435/">CVE-2022-21435 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21435">CVE-2022-21435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21436/">CVE-2022-21436 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21436">CVE-2022-21436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21437/">CVE-2022-21437 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21437">CVE-2022-21437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21438/">CVE-2022-21438 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21438">CVE-2022-21438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21440/">CVE-2022-21440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21440">CVE-2022-21440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21444/">CVE-2022-21444 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21444">CVE-2022-21444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21451/">CVE-2022-21451 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21451">CVE-2022-21451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21452/">CVE-2022-21452 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21452">CVE-2022-21452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21454/">CVE-2022-21454 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21454">CVE-2022-21454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21455/">CVE-2022-21455 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21455">CVE-2022-21455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21457/">CVE-2022-21457 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21457">CVE-2022-21457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21459/">CVE-2022-21459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21459">CVE-2022-21459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21460/">CVE-2022-21460 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21460">CVE-2022-21460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21462/">CVE-2022-21462 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21462">CVE-2022-21462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21478/">CVE-2022-21478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21478">CVE-2022-21478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21479/">CVE-2022-21479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21479">CVE-2022-21479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21509/">CVE-2022-21509 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21509">CVE-2022-21509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21515/">CVE-2022-21515 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21515">CVE-2022-21515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21517/">CVE-2022-21517 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21517">CVE-2022-21517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21522/">CVE-2022-21522 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21522">CVE-2022-21522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21525/">CVE-2022-21525 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21525">CVE-2022-21525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21526/">CVE-2022-21526 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21526">CVE-2022-21526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21527/">CVE-2022-21527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21527">CVE-2022-21527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21528/">CVE-2022-21528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21528">CVE-2022-21528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21529/">CVE-2022-21529 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21529">CVE-2022-21529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21530/">CVE-2022-21530 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21530">CVE-2022-21530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21531/">CVE-2022-21531 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21531">CVE-2022-21531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21534/">CVE-2022-21534 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21534">CVE-2022-21534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21537/">CVE-2022-21537 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21537">CVE-2022-21537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21538/">CVE-2022-21538 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21538">CVE-2022-21538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21539/">CVE-2022-21539 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21539">CVE-2022-21539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21547/">CVE-2022-21547 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21547">CVE-2022-21547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21553/">CVE-2022-21553 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21553">CVE-2022-21553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21556/">CVE-2022-21556 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21556">CVE-2022-21556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21569/">CVE-2022-21569 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21569">CVE-2022-21569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21592/">CVE-2022-21592 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21592">CVE-2022-21592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21605/">CVE-2022-21605 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21605">CVE-2022-21605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21607/">CVE-2022-21607 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21607">CVE-2022-21607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21635/">CVE-2022-21635 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21635">CVE-2022-21635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21638/">CVE-2022-21638 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21638">CVE-2022-21638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21641/">CVE-2022-21641 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21641">CVE-2022-21641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21866/">CVE-2023-21866 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21866">CVE-2023-21866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21872/">CVE-2023-21872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21872">CVE-2023-21872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3635" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-28469" ref_url="https://www.suse.com/security/cve/CVE-2020-28469/" source="CVE"/>
		<reference ref_id="CVE-2020-7788" ref_url="https://www.suse.com/security/cve/CVE-2020-7788/" source="CVE"/>
		<reference ref_id="CVE-2021-33502" ref_url="https://www.suse.com/security/cve/CVE-2021-33502/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2022-29244" ref_url="https://www.suse.com/security/cve/CVE-2022-29244/" source="CVE"/>
		<reference ref_id="CVE-2022-32212" ref_url="https://www.suse.com/security/cve/CVE-2022-32212/" source="CVE"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<reference ref_id="CVE-2022-32214" ref_url="https://www.suse.com/security/cve/CVE-2022-32214/" source="CVE"/>
		<reference ref_id="CVE-2022-32215" ref_url="https://www.suse.com/security/cve/CVE-2022-32215/" source="CVE"/>
		<reference ref_id="CVE-2022-33987" ref_url="https://www.suse.com/security/cve/CVE-2022-33987/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6595.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6595.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28469/">CVE-2020-28469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28469">CVE-2020-28469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7788/">CVE-2020-7788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7788">CVE-2020-7788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33502/">CVE-2021-33502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33502">CVE-2021-33502 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">CVE-2021-3807 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29244/">CVE-2022-29244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29244">CVE-2022-29244 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32212/">CVE-2022-32212 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32212">CVE-2022-32212 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32213">CVE-2022-32213 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32214/">CVE-2022-32214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32214">CVE-2022-32214 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32215/">CVE-2022-32215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32215">CVE-2022-32215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-33987/">CVE-2022-33987 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33987">CVE-2022-33987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804553" comment="nodejs-16.16.0-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804554" comment="nodejs-docs-16.16.0-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804555" comment="nodejs-full-i18n-16.16.0-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804556" comment="nodejs-libs-16.16.0-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804557" comment="nodejs-nodemon-2.0.19-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804558" comment="npm-8.11.0-1.16.16.0.1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3636" version="1" class="patch">
	<metadata>
		<title>security update for gnupg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-34903" ref_url="https://www.suse.com/security/cve/CVE-2022-34903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6602.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6602.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34903/">CVE-2022-34903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804559" comment="gnupg2-2.3.3-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804560" comment="gnupg2-smime-2.3.3-2.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3637" version="1" class="patch">
	<metadata>
		<title>security update for dbus-broker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-31212" ref_url="https://www.suse.com/security/cve/CVE-2022-31212/" source="CVE"/>
		<reference ref_id="CVE-2022-31213" ref_url="https://www.suse.com/security/cve/CVE-2022-31213/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6608.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6608.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31212/">CVE-2022-31212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31212">CVE-2022-31212 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31213/">CVE-2022-31213 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31213">CVE-2022-31213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804561" comment="dbus-broker-28-5.1.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3638" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2078" ref_url="https://www.suse.com/security/cve/CVE-2022-2078/" source="CVE"/>
		<reference ref_id="CVE-2022-34918" ref_url="https://www.suse.com/security/cve/CVE-2022-34918/" source="CVE"/>
		<reference ref_id="CVE-2022-49063" ref_url="https://www.suse.com/security/cve/CVE-2022-49063/" source="CVE"/>
		<reference ref_id="CVE-2022-49722" ref_url="https://www.suse.com/security/cve/CVE-2022-49722/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6610.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6610.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2078/">CVE-2022-2078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2078">CVE-2022-2078 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34918/">CVE-2022-34918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49063/">CVE-2022-49063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49063">CVE-2022-49063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49722/">CVE-2022-49722 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49722">CVE-2022-49722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804562" comment="bpftool-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804563" comment="kernel-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804564" comment="kernel-abi-stablelists-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804565" comment="kernel-core-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804566" comment="kernel-cross-headers-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804567" comment="kernel-debug-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804568" comment="kernel-debug-core-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804571" comment="kernel-debug-modules-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804572" comment="kernel-debug-modules-extra-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804575" comment="kernel-doc-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804576" comment="kernel-headers-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804577" comment="kernel-modules-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804578" comment="kernel-modules-extra-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804579" comment="kernel-tools-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804580" comment="kernel-tools-libs-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804582" comment="perf-5.14.0-70.26.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804583" comment="python3-perf-5.14.0-70.26.1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3639" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-32893" ref_url="https://www.suse.com/security/cve/CVE-2022-32893/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6634.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6634.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32893/">CVE-2022-32893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32893">CVE-2022-32893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804584" comment="webkit2gtk3-2.36.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804585" comment="webkit2gtk3-devel-2.36.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804586" comment="webkit2gtk3-jsc-2.36.7-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804587" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3640" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3266" ref_url="https://www.suse.com/security/cve/CVE-2022-3266/" source="CVE"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6700.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6700.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3266/">CVE-2022-3266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3266">CVE-2022-3266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804588" comment="firefox-102.3.0-6.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3641" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3032" ref_url="https://www.suse.com/security/cve/CVE-2022-3032/" source="CVE"/>
		<reference ref_id="CVE-2022-3033" ref_url="https://www.suse.com/security/cve/CVE-2022-3033/" source="CVE"/>
		<reference ref_id="CVE-2022-3034" ref_url="https://www.suse.com/security/cve/CVE-2022-3034/" source="CVE"/>
		<reference ref_id="CVE-2022-3266" ref_url="https://www.suse.com/security/cve/CVE-2022-3266/" source="CVE"/>
		<reference ref_id="CVE-2022-36059" ref_url="https://www.suse.com/security/cve/CVE-2022-36059/" source="CVE"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6717.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6717.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3032/">CVE-2022-3032 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3032">CVE-2022-3032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3033/">CVE-2022-3033 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3033">CVE-2022-3033 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3034/">CVE-2022-3034 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3034">CVE-2022-3034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3266/">CVE-2022-3266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3266">CVE-2022-3266 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36059/">CVE-2022-36059 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36059">CVE-2022-36059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804589" comment="thunderbird-102.3.0-3.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3642" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3080" ref_url="https://www.suse.com/security/cve/CVE-2022-3080/" source="CVE"/>
		<reference ref_id="CVE-2022-38177" ref_url="https://www.suse.com/security/cve/CVE-2022-38177/" source="CVE"/>
		<reference ref_id="CVE-2022-38178" ref_url="https://www.suse.com/security/cve/CVE-2022-38178/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6763.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6763.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3080/">CVE-2022-3080 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3080">CVE-2022-3080 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38177/">CVE-2022-38177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38177">CVE-2022-38177 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38178/">CVE-2022-38178 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38178">CVE-2022-38178 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804590" comment="bind-9.16.23-1.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804591" comment="bind-chroot-9.16.23-1.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804592" comment="bind-devel-9.16.23-1.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804593" comment="bind-dnssec-doc-9.16.23-1.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804594" comment="bind-dnssec-utils-9.16.23-1.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804595" comment="bind-libs-9.16.23-1.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804596" comment="bind-license-9.16.23-1.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804597" comment="bind-utils-9.16.23-1.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804598" comment="python3-bind-9.16.23-1.el9_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3643" version="1" class="patch">
	<metadata>
		<title>security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6838.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6838.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804599" comment="expat-2.2.10-12.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804600" comment="expat-devel-2.2.10-12.el9_0.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3644" version="1" class="patch">
	<metadata>
		<title>security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41318" ref_url="https://www.suse.com/security/cve/CVE-2022-41318/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6839.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6839.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-41318/">CVE-2022-41318 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41318">CVE-2022-41318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804601" comment="squid-5.2-1.el9_0.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3645" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2509" ref_url="https://www.suse.com/security/cve/CVE-2022-2509/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6854.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6854.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2509/">CVE-2022-2509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2509">CVE-2022-2509 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804602" comment="gnutls-3.7.6-12.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804603" comment="gnutls-c++-3.7.6-12.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804604" comment="gnutls-dane-3.7.6-12.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804605" comment="gnutls-devel-3.7.6-12.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804606" comment="gnutls-utils-3.7.6-12.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804607" comment="nettle-3.8-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804608" comment="nettle-devel-3.8-3.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3646" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41032" ref_url="https://www.suse.com/security/cve/CVE-2022-41032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6913.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6913.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41032/">CVE-2022-41032 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41032">CVE-2022-41032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804609" comment="aspnetcore-runtime-6.0-6.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804610" comment="aspnetcore-targeting-pack-6.0-6.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804611" comment="dotnet-apphost-pack-6.0-6.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804612" comment="dotnet-host-6.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804613" comment="dotnet-hostfxr-6.0-6.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804614" comment="dotnet-runtime-6.0-6.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804615" comment="dotnet-sdk-6.0-6.0.110-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804616" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.110-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804617" comment="dotnet-targeting-pack-6.0-6.0.10-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804618" comment="dotnet-templates-6.0-6.0.110-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804619" comment="netstandard-targeting-pack-2.1-6.0.110-1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3647" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-35255" ref_url="https://www.suse.com/security/cve/CVE-2022-35255/" source="CVE"/>
		<reference ref_id="CVE-2022-35256" ref_url="https://www.suse.com/security/cve/CVE-2022-35256/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6963.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6963.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-35255/">CVE-2022-35255 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35255">CVE-2022-35255 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35256/">CVE-2022-35256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35256">CVE-2022-35256 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804620" comment="nodejs-16.17.1-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804621" comment="nodejs-docs-16.17.1-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804622" comment="nodejs-full-i18n-16.17.1-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804623" comment="nodejs-libs-16.17.1-1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804624" comment="npm-8.15.0-1.16.17.1.1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3648" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-33068" ref_url="https://www.suse.com/security/cve/CVE-2022-33068/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6999.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6999.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-33068/">CVE-2022-33068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33068">CVE-2022-33068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804625" comment="java-17-openjdk-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804626" comment="java-17-openjdk-demo-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804627" comment="java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804628" comment="java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804629" comment="java-17-openjdk-devel-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804630" comment="java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804631" comment="java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804632" comment="java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804633" comment="java-17-openjdk-headless-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804634" comment="java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804635" comment="java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804636" comment="java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804637" comment="java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804638" comment="java-17-openjdk-jmods-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804639" comment="java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804640" comment="java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804641" comment="java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804642" comment="java-17-openjdk-src-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804643" comment="java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804644" comment="java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804645" comment="java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804646" comment="java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804647" comment="java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3649" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7007.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7007.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804648" comment="java-1.8.0-openjdk-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804649" comment="java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804650" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804651" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804652" comment="java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804653" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804654" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804655" comment="java-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804656" comment="java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804657" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804658" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804659" comment="java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804660" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804661" comment="java-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804662" comment="java-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804663" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804664" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3650" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-33068" ref_url="https://www.suse.com/security/cve/CVE-2022-33068/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7013.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7013.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-33068/">CVE-2022-33068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33068">CVE-2022-33068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804665" comment="java-11-openjdk-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804666" comment="java-11-openjdk-demo-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804667" comment="java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804668" comment="java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804669" comment="java-11-openjdk-devel-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804670" comment="java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804671" comment="java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804672" comment="java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804673" comment="java-11-openjdk-headless-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804674" comment="java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804675" comment="java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804676" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804677" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804678" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804679" comment="java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804680" comment="java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804681" comment="java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804682" comment="java-11-openjdk-src-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804683" comment="java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804684" comment="java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804685" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804686" comment="java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804687" comment="java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3651" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7020.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7020.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804688" comment="firefox-102.3.0-7.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3652" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7026.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7026.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804689" comment="thunderbird-102.3.0-4.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3653" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7071.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7071.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804690" comment="firefox-102.4.0-1.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3654" version="1" class="patch">
	<metadata>
		<title>security update for libksba (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3515" ref_url="https://www.suse.com/security/cve/CVE-2022-3515/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7090.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7090.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3515/">CVE-2022-3515 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3515">CVE-2022-3515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804691" comment="libksba-1.5.1-5.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804692" comment="libksba-devel-1.5.1-5.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3655" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-39236" ref_url="https://www.suse.com/security/cve/CVE-2022-39236/" source="CVE"/>
		<reference ref_id="CVE-2022-39249" ref_url="https://www.suse.com/security/cve/CVE-2022-39249/" source="CVE"/>
		<reference ref_id="CVE-2022-39250" ref_url="https://www.suse.com/security/cve/CVE-2022-39250/" source="CVE"/>
		<reference ref_id="CVE-2022-39251" ref_url="https://www.suse.com/security/cve/CVE-2022-39251/" source="CVE"/>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7178.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7178.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39236/">CVE-2022-39236 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39236">CVE-2022-39236 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39249/">CVE-2022-39249 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39249">CVE-2022-39249 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39250/">CVE-2022-39250 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39250">CVE-2022-39250 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39251/">CVE-2022-39251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39251">CVE-2022-39251 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804693" comment="thunderbird-102.4.0-1.el9_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3656" version="1" class="patch">
	<metadata>
		<title>security update for device-mapper-multipath (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41974" ref_url="https://www.suse.com/security/cve/CVE-2022-41974/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7185.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7185.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41974/">CVE-2022-41974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41974">CVE-2022-41974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804694" comment="device-mapper-multipath-0.8.7-7.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804695" comment="device-mapper-multipath-devel-0.8.7-7.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804696" comment="device-mapper-multipath-libs-0.8.7-7.el9_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804697" comment="kpartx-0.8.7-7.el9_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3657" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602/" source="CVE"/>
		<reference ref_id="CVE-2022-3786" ref_url="https://www.suse.com/security/cve/CVE-2022-3786/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7288.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7288.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3786/">CVE-2022-3786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804698" comment="openssl-3.0.1-43.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804699" comment="openssl-devel-3.0.1-43.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804700" comment="openssl-libs-3.0.1-43.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804701" comment="openssl-perl-3.0.1-43.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3658" version="1" class="patch">
	<metadata>
		<title>security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7314.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7314.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804702" comment="zlib-1.2.11-32.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804703" comment="zlib-devel-1.2.11-32.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804704" comment="zlib-static-1.2.11-32.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3659" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2585" ref_url="https://www.suse.com/security/cve/CVE-2022-2585/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="CVE-2022-49281" ref_url="https://www.suse.com/security/cve/CVE-2022-49281/" source="CVE"/>
		<reference ref_id="CVE-2022-50095" ref_url="https://www.suse.com/security/cve/CVE-2022-50095/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7318.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7318.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2585/">CVE-2022-2585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49281/">CVE-2022-49281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49281">CVE-2022-49281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50095/">CVE-2022-50095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50095">CVE-2022-50095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804705" comment="bpftool-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804706" comment="kernel-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804707" comment="kernel-abi-stablelists-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804708" comment="kernel-core-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804709" comment="kernel-cross-headers-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804710" comment="kernel-debug-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804711" comment="kernel-debug-core-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804714" comment="kernel-debug-modules-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804715" comment="kernel-debug-modules-extra-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804718" comment="kernel-doc-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804719" comment="kernel-headers-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804720" comment="kernel-modules-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804721" comment="kernel-modules-extra-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804722" comment="kernel-tools-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804723" comment="kernel-tools-libs-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804725" comment="perf-5.14.0-70.30.1.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804726" comment="python3-perf-5.14.0-70.30.1.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3660" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7323.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7323.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804727" comment="python-unversioned-command-3.9.10-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804728" comment="python3-3.9.10-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804729" comment="python3-debug-3.9.10-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804730" comment="python3-devel-3.9.10-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804731" comment="python3-idle-3.9.10-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804732" comment="python3-libs-3.9.10-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804733" comment="python3-test-3.9.10-3.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804734" comment="python3-tkinter-3.9.10-3.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3661" version="1" class="patch">
	<metadata>
		<title>security update for pki-core (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2414" ref_url="https://www.suse.com/security/cve/CVE-2022-2414/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7326.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7326.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2414/">CVE-2022-2414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2414">CVE-2022-2414 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804735" comment="pki-acme-11.0.6-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804736" comment="pki-base-11.0.6-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804737" comment="pki-base-java-11.0.6-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804738" comment="pki-ca-11.0.6-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804739" comment="pki-kra-11.0.6-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804740" comment="pki-server-11.0.6-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804741" comment="pki-symkey-11.0.6-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804742" comment="pki-tools-11.0.6-2.el9_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804743" comment="python3-pki-11.0.6-2.el9_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3662" version="1" class="patch">
	<metadata>
		<title>security update for lua (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-33099" ref_url="https://www.suse.com/security/cve/CVE-2022-33099/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7329.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7329.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33099/">CVE-2022-33099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33099">CVE-2022-33099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804744" comment="lua-5.4.2-4.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804745" comment="lua-devel-5.4.2-4.el9_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804746" comment="lua-libs-5.4.2-4.el9_0.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3663" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1049" ref_url="https://www.suse.com/security/cve/CVE-2022-1049/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7935.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7935.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1049/">CVE-2022-1049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1049">CVE-2022-1049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804747" comment="pcs-0.11.3-4.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804748" comment="pcs-snmp-0.11.3-4.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3664" version="1" class="patch">
	<metadata>
		<title>security update for podman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-28851" ref_url="https://www.suse.com/security/cve/CVE-2020-28851/" source="CVE"/>
		<reference ref_id="CVE-2020-28852" ref_url="https://www.suse.com/security/cve/CVE-2020-28852/" source="CVE"/>
		<reference ref_id="CVE-2021-20199" ref_url="https://www.suse.com/security/cve/CVE-2021-20199/" source="CVE"/>
		<reference ref_id="CVE-2021-20291" ref_url="https://www.suse.com/security/cve/CVE-2021-20291/" source="CVE"/>
		<reference ref_id="CVE-2021-33197" ref_url="https://www.suse.com/security/cve/CVE-2021-33197/" source="CVE"/>
		<reference ref_id="CVE-2021-34558" ref_url="https://www.suse.com/security/cve/CVE-2021-34558/" source="CVE"/>
		<reference ref_id="CVE-2021-4024" ref_url="https://www.suse.com/security/cve/CVE-2021-4024/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7954.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7954.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28851/">CVE-2020-28851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28851">CVE-2020-28851 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28852/">CVE-2020-28852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28852">CVE-2020-28852 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20199/">CVE-2021-20199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20199">CVE-2021-20199 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20291/">CVE-2021-20291 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20291">CVE-2021-20291 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33197/">CVE-2021-33197 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33197">CVE-2021-33197 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34558/">CVE-2021-34558 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34558">CVE-2021-34558 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4024/">CVE-2021-4024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4024">CVE-2021-4024 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804749" comment="podman-4.2.0-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804750" comment="podman-docker-4.2.0-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804751" comment="podman-gvproxy-4.2.0-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804752" comment="podman-plugins-4.2.0-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804753" comment="podman-remote-4.2.0-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804754" comment="podman-tests-4.2.0-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3665" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-20291" ref_url="https://www.suse.com/security/cve/CVE-2021-20291/" source="CVE"/>
		<reference ref_id="CVE-2021-33198" ref_url="https://www.suse.com/security/cve/CVE-2021-33198/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7955.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7955.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20291/">CVE-2021-20291 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20291">CVE-2021-20291 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33198/">CVE-2021-33198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804755" comment="skopeo-1.9.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804756" comment="skopeo-tests-1.9.2-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3666" version="1" class="patch">
	<metadata>
		<title>security update for libguestfs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2211" ref_url="https://www.suse.com/security/cve/CVE-2022-2211/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7958.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7958.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2211/">CVE-2022-2211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2211">CVE-2022-2211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804757" comment="libguestfs-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804758" comment="libguestfs-appliance-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804759" comment="libguestfs-bash-completion-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804760" comment="libguestfs-devel-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804761" comment="libguestfs-gobject-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804762" comment="libguestfs-gobject-devel-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804763" comment="libguestfs-inspect-icons-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804764" comment="libguestfs-man-pages-ja-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804765" comment="libguestfs-man-pages-uk-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804766" comment="libguestfs-rescue-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804767" comment="libguestfs-rsync-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804768" comment="libguestfs-xfs-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804769" comment="lua-guestfs-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804770" comment="ocaml-libguestfs-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804771" comment="ocaml-libguestfs-devel-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804772" comment="perl-Sys-Guestfs-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804773" comment="php-libguestfs-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804774" comment="python3-libguestfs-1.48.4-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804775" comment="ruby-libguestfs-1.48.4-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3667" version="1" class="patch">
	<metadata>
		<title>security update for guestfs-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2211" ref_url="https://www.suse.com/security/cve/CVE-2022-2211/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7959.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7959.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2211/">CVE-2022-2211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2211">CVE-2022-2211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804776" comment="guestfs-tools-1.48.2-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804777" comment="virt-win-reg-1.48.2-5.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3668" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-3507" ref_url="https://www.suse.com/security/cve/CVE-2021-3507/" source="CVE"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<reference ref_id="CVE-2021-3750" ref_url="https://www.suse.com/security/cve/CVE-2021-3750/" source="CVE"/>
		<reference ref_id="CVE-2021-4158" ref_url="https://www.suse.com/security/cve/CVE-2021-4158/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7967.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7967.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3507/">CVE-2021-3507 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3507">CVE-2021-3507 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3611">CVE-2021-3611 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3750/">CVE-2021-3750 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3750">CVE-2021-3750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4158/">CVE-2021-4158 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4158">CVE-2021-4158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804778" comment="qemu-guest-agent-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804779" comment="qemu-img-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804780" comment="qemu-kvm-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804781" comment="qemu-kvm-audio-pa-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804782" comment="qemu-kvm-block-curl-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804783" comment="qemu-kvm-block-rbd-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804784" comment="qemu-kvm-common-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804785" comment="qemu-kvm-core-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804786" comment="qemu-kvm-device-display-virtio-gpu-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804787" comment="qemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804788" comment="qemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804789" comment="qemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804790" comment="qemu-kvm-device-display-virtio-vga-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804791" comment="qemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804792" comment="qemu-kvm-device-usb-host-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804793" comment="qemu-kvm-device-usb-redirect-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804794" comment="qemu-kvm-docs-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804795" comment="qemu-kvm-tools-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804796" comment="qemu-kvm-ui-egl-headless-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804797" comment="qemu-kvm-ui-opengl-7.0.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804798" comment="qemu-pr-helper-7.0.0-13.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3669" version="1" class="patch">
	<metadata>
		<title>security update for virt-v2v (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2211" ref_url="https://www.suse.com/security/cve/CVE-2022-2211/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7968.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7968.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2211/">CVE-2022-2211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2211">CVE-2022-2211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804799" comment="virt-v2v-2.0.7-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804800" comment="virt-v2v-bash-completion-2.0.7-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804801" comment="virt-v2v-man-pages-ja-2.0.7-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804802" comment="virt-v2v-man-pages-uk-2.0.7-6.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3670" version="1" class="patch">
	<metadata>
		<title>security update for protobuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-22570" ref_url="https://www.suse.com/security/cve/CVE-2021-22570/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7970.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7970.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22570/">CVE-2021-22570 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22570">CVE-2021-22570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804803" comment="protobuf-3.14.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804804" comment="protobuf-compiler-3.14.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804805" comment="protobuf-devel-3.14.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804806" comment="protobuf-lite-3.14.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804807" comment="protobuf-lite-devel-3.14.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804808" comment="python3-protobuf-3.14.0-13.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3671" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-30067" ref_url="https://www.suse.com/security/cve/CVE-2022-30067/" source="CVE"/>
		<reference ref_id="CVE-2022-32990" ref_url="https://www.suse.com/security/cve/CVE-2022-32990/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7978.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7978.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30067/">CVE-2022-30067 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30067">CVE-2022-30067 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32990/">CVE-2022-32990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32990">CVE-2022-32990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804809" comment="gimp-2.99.8-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804810" comment="gimp-libs-2.99.8-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3672" version="1" class="patch">
	<metadata>
		<title>security update for speex (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-23903" ref_url="https://www.suse.com/security/cve/CVE-2020-23903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7979.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7979.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23903/">CVE-2020-23903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-23903">CVE-2020-23903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804811" comment="speex-1.2.0-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804812" comment="speex-devel-1.2.0-11.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3673" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-0897" ref_url="https://www.suse.com/security/cve/CVE-2022-0897/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8003.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8003.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0897/">CVE-2022-0897 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0897">CVE-2022-0897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804813" comment="libvirt-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804814" comment="libvirt-client-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804815" comment="libvirt-daemon-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804816" comment="libvirt-daemon-config-network-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804817" comment="libvirt-daemon-config-nwfilter-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804818" comment="libvirt-daemon-driver-interface-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804819" comment="libvirt-daemon-driver-network-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804820" comment="libvirt-daemon-driver-nodedev-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804821" comment="libvirt-daemon-driver-nwfilter-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804822" comment="libvirt-daemon-driver-qemu-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804823" comment="libvirt-daemon-driver-secret-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804824" comment="libvirt-daemon-driver-storage-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804825" comment="libvirt-daemon-driver-storage-core-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804826" comment="libvirt-daemon-driver-storage-disk-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804827" comment="libvirt-daemon-driver-storage-iscsi-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804828" comment="libvirt-daemon-driver-storage-logical-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804829" comment="libvirt-daemon-driver-storage-mpath-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804830" comment="libvirt-daemon-driver-storage-rbd-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804831" comment="libvirt-daemon-driver-storage-scsi-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804832" comment="libvirt-daemon-kvm-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804833" comment="libvirt-devel-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804834" comment="libvirt-docs-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804835" comment="libvirt-libs-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804836" comment="libvirt-lock-sanlock-8.5.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804837" comment="libvirt-nss-8.5.0-7.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3674" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-20291" ref_url="https://www.suse.com/security/cve/CVE-2021-20291/" source="CVE"/>
		<reference ref_id="CVE-2021-33195" ref_url="https://www.suse.com/security/cve/CVE-2021-33195/" source="CVE"/>
		<reference ref_id="CVE-2021-33197" ref_url="https://www.suse.com/security/cve/CVE-2021-33197/" source="CVE"/>
		<reference ref_id="CVE-2021-33198" ref_url="https://www.suse.com/security/cve/CVE-2021-33198/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="CVE-2022-2989" ref_url="https://www.suse.com/security/cve/CVE-2022-2989/" source="CVE"/>
		<reference ref_id="CVE-2022-2990" ref_url="https://www.suse.com/security/cve/CVE-2022-2990/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8008.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8008.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20291/">CVE-2021-20291 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20291">CVE-2021-20291 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33195/">CVE-2021-33195 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33195">CVE-2021-33195 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33197/">CVE-2021-33197 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33197">CVE-2021-33197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33198/">CVE-2021-33198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2989/">CVE-2022-2989 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2989">CVE-2022-2989 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2990/">CVE-2022-2990 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2990">CVE-2022-2990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804838" comment="buildah-1.27.0-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804839" comment="buildah-tests-1.27.0-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3675" version="1" class="patch">
	<metadata>
		<title>security update for fribidi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-25308" ref_url="https://www.suse.com/security/cve/CVE-2022-25308/" source="CVE"/>
		<reference ref_id="CVE-2022-25309" ref_url="https://www.suse.com/security/cve/CVE-2022-25309/" source="CVE"/>
		<reference ref_id="CVE-2022-25310" ref_url="https://www.suse.com/security/cve/CVE-2022-25310/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8011.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8011.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25308/">CVE-2022-25308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25308">CVE-2022-25308 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-25309/">CVE-2022-25309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25309">CVE-2022-25309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25310/">CVE-2022-25310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25310">CVE-2022-25310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804840" comment="fribidi-1.0.10-6.el9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804841" comment="fribidi-devel-1.0.10-6.el9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3676" version="1" class="patch">
	<metadata>
		<title>security update for qt5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8022.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8022.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25255">CVE-2022-25255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804842" comment="qt5-5.15.3-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804843" comment="qt5-devel-5.15.3-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804844" comment="qt5-rpm-macros-5.15.3-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804845" comment="qt5-srpm-macros-5.15.3-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3677" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22662" ref_url="https://www.suse.com/security/cve/CVE-2022-22662/" source="CVE"/>
		<reference ref_id="CVE-2022-26700" ref_url="https://www.suse.com/security/cve/CVE-2022-26700/" source="CVE"/>
		<reference ref_id="CVE-2022-26709" ref_url="https://www.suse.com/security/cve/CVE-2022-26709/" source="CVE"/>
		<reference ref_id="CVE-2022-26710" ref_url="https://www.suse.com/security/cve/CVE-2022-26710/" source="CVE"/>
		<reference ref_id="CVE-2022-26716" ref_url="https://www.suse.com/security/cve/CVE-2022-26716/" source="CVE"/>
		<reference ref_id="CVE-2022-26717" ref_url="https://www.suse.com/security/cve/CVE-2022-26717/" source="CVE"/>
		<reference ref_id="CVE-2022-26719" ref_url="https://www.suse.com/security/cve/CVE-2022-26719/" source="CVE"/>
		<reference ref_id="CVE-2022-30293" ref_url="https://www.suse.com/security/cve/CVE-2022-30293/" source="CVE"/>
		<reference ref_id="CVE-2022-32792" ref_url="https://www.suse.com/security/cve/CVE-2022-32792/" source="CVE"/>
		<reference ref_id="CVE-2022-32816" ref_url="https://www.suse.com/security/cve/CVE-2022-32816/" source="CVE"/>
		<reference ref_id="CVE-2022-32891" ref_url="https://www.suse.com/security/cve/CVE-2022-32891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8054.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8054.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22624">CVE-2022-22624 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22628">CVE-2022-22628 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22629">CVE-2022-22629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22662/">CVE-2022-22662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22662">CVE-2022-22662 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26700/">CVE-2022-26700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26700">CVE-2022-26700 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26709/">CVE-2022-26709 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26709">CVE-2022-26709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26710/">CVE-2022-26710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26710">CVE-2022-26710 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26716/">CVE-2022-26716 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26716">CVE-2022-26716 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26717/">CVE-2022-26717 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26717">CVE-2022-26717 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26719/">CVE-2022-26719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26719">CVE-2022-26719 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30293/">CVE-2022-30293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30293">CVE-2022-30293 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32792/">CVE-2022-32792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32792">CVE-2022-32792 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32816/">CVE-2022-32816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32816">CVE-2022-32816 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-32891/">CVE-2022-32891 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32891">CVE-2022-32891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3678" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-23648" ref_url="https://www.suse.com/security/cve/CVE-2021-23648/" source="CVE"/>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962/" source="CVE"/>
		<reference ref_id="CVE-2022-21673" ref_url="https://www.suse.com/security/cve/CVE-2022-21673/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-21702" ref_url="https://www.suse.com/security/cve/CVE-2022-21702/" source="CVE"/>
		<reference ref_id="CVE-2022-21703" ref_url="https://www.suse.com/security/cve/CVE-2022-21703/" source="CVE"/>
		<reference ref_id="CVE-2022-21713" ref_url="https://www.suse.com/security/cve/CVE-2022-21713/" source="CVE"/>
		<reference ref_id="CVE-2022-28131" ref_url="https://www.suse.com/security/cve/CVE-2022-28131/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30633" ref_url="https://www.suse.com/security/cve/CVE-2022-30633/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8057.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8057.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23648/">CVE-2021-23648 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23648">CVE-2021-23648 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21673/">CVE-2022-21673 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21673">CVE-2022-21673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21702/">CVE-2022-21702 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21702">CVE-2022-21702 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21703/">CVE-2022-21703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21703">CVE-2022-21703 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21713/">CVE-2022-21713 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21713">CVE-2022-21713 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28131/">CVE-2022-28131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30633/">CVE-2022-30633 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3679" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-30698" ref_url="https://www.suse.com/security/cve/CVE-2022-30698/" source="CVE"/>
		<reference ref_id="CVE-2022-30699" ref_url="https://www.suse.com/security/cve/CVE-2022-30699/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8062.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8062.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-30698/">CVE-2022-30698 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30698">CVE-2022-30698 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-30699/">CVE-2022-30699 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30699">CVE-2022-30699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804851" comment="python3-unbound-1.16.2-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804852" comment="unbound-1.16.2-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804853" comment="unbound-devel-1.16.2-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804854" comment="unbound-libs-1.16.2-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3680" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="CVE-2022-26377" ref_url="https://www.suse.com/security/cve/CVE-2022-26377/" source="CVE"/>
		<reference ref_id="CVE-2022-28614" ref_url="https://www.suse.com/security/cve/CVE-2022-28614/" source="CVE"/>
		<reference ref_id="CVE-2022-28615" ref_url="https://www.suse.com/security/cve/CVE-2022-28615/" source="CVE"/>
		<reference ref_id="CVE-2022-29404" ref_url="https://www.suse.com/security/cve/CVE-2022-29404/" source="CVE"/>
		<reference ref_id="CVE-2022-30522" ref_url="https://www.suse.com/security/cve/CVE-2022-30522/" source="CVE"/>
		<reference ref_id="CVE-2022-30556" ref_url="https://www.suse.com/security/cve/CVE-2022-30556/" source="CVE"/>
		<reference ref_id="CVE-2022-31813" ref_url="https://www.suse.com/security/cve/CVE-2022-31813/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8067.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8067.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22719">CVE-2022-22719 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23943">CVE-2022-23943 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26377/">CVE-2022-26377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26377">CVE-2022-26377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28614/">CVE-2022-28614 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28614">CVE-2022-28614 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28615/">CVE-2022-28615 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28615">CVE-2022-28615 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29404/">CVE-2022-29404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29404">CVE-2022-29404 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30522/">CVE-2022-30522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30522">CVE-2022-30522 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30556/">CVE-2022-30556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30556">CVE-2022-30556 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31813/">CVE-2022-31813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31813">CVE-2022-31813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804855" comment="httpd-2.4.53-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804856" comment="httpd-core-2.4.53-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804857" comment="httpd-devel-2.4.53-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804858" comment="httpd-filesystem-2.4.53-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804859" comment="httpd-manual-2.4.53-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804860" comment="httpd-tools-2.4.53-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804861" comment="mod_ldap-2.4.53-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804862" comment="mod_lua-2.4.53-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804863" comment="mod_proxy_html-2.4.53-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804864" comment="mod_session-2.4.53-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804865" comment="mod_ssl-2.4.53-7.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3681" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="CVE-2022-0396" ref_url="https://www.suse.com/security/cve/CVE-2022-0396/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8068.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8068.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0396/">CVE-2022-0396 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0396">CVE-2022-0396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804866" comment="bind-9.16.23-5.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804867" comment="bind-chroot-9.16.23-5.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804868" comment="bind-devel-9.16.23-5.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804869" comment="bind-dnssec-doc-9.16.23-5.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804870" comment="bind-dnssec-utils-9.16.23-5.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804871" comment="bind-doc-9.16.23-5.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804872" comment="bind-libs-9.16.23-5.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804873" comment="bind-license-9.16.23-5.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804874" comment="bind-utils-9.16.23-5.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804875" comment="python3-bind-9.16.23-5.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3682" version="1" class="patch">
	<metadata>
		<title>security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8070.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8070.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804876" comment="dnsmasq-2.85-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804877" comment="dnsmasq-utils-2.85-5.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3683" version="1" class="patch">
	<metadata>
		<title>security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-0561" ref_url="https://www.suse.com/security/cve/CVE-2021-0561/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8078.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8078.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0561/">CVE-2021-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0561">CVE-2021-0561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804878" comment="flac-1.3.3-10.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804879" comment="flac-devel-1.3.3-10.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804880" comment="flac-libs-1.3.3-10.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3684" version="1" class="patch">
	<metadata>
		<title>security update for runc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-29162" ref_url="https://www.suse.com/security/cve/CVE-2022-29162/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8090.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8090.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29162/">CVE-2022-29162 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804881" comment="runc-1.1.4-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3685" version="1" class="patch">
	<metadata>
		<title>security update for redis (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-24735" ref_url="https://www.suse.com/security/cve/CVE-2022-24735/" source="CVE"/>
		<reference ref_id="CVE-2022-24736" ref_url="https://www.suse.com/security/cve/CVE-2022-24736/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8096.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8096.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-24735/">CVE-2022-24735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24735">CVE-2022-24735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24736/">CVE-2022-24736 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24736">CVE-2022-24736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804882" comment="redis-6.2.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804883" comment="redis-devel-6.2.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804884" comment="redis-doc-6.2.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3686" version="1" class="patch">
	<metadata>
		<title>security update for toolbox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8098.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8098.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804885" comment="toolbox-0.0.99.3-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804886" comment="toolbox-tests-0.0.99.3-5.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3687" version="1" class="patch">
	<metadata>
		<title>security update for swtpm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-23645" ref_url="https://www.suse.com/security/cve/CVE-2022-23645/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8100.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8100.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23645/">CVE-2022-23645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23645">CVE-2022-23645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804887" comment="swtpm-0.7.0-3.20211109gitb79fd91.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804888" comment="swtpm-libs-0.7.0-3.20211109gitb79fd91.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804889" comment="swtpm-tools-0.7.0-3.20211109gitb79fd91.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3688" version="1" class="patch">
	<metadata>
		<title>security update for frr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-26125" ref_url="https://www.suse.com/security/cve/CVE-2022-26125/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8112.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8112.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26125/">CVE-2022-26125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26125">CVE-2022-26125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804890" comment="frr-8.2.2-4.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3689" version="1" class="patch">
	<metadata>
		<title>security update for ignition (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1706" ref_url="https://www.suse.com/security/cve/CVE-2022-1706/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8126.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8126.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1706/">CVE-2022-1706 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1706">CVE-2022-1706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804891" comment="ignition-2.14.0-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3690" version="1" class="patch">
	<metadata>
		<title>security update for wavpack (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-44269" ref_url="https://www.suse.com/security/cve/CVE-2021-44269/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8139.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8139.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44269/">CVE-2021-44269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44269">CVE-2021-44269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804892" comment="wavpack-5.4.0-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804893" comment="wavpack-devel-5.4.0-5.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3691" version="1" class="patch">
	<metadata>
		<title>security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-27337" ref_url="https://www.suse.com/security/cve/CVE-2022-27337/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8151.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8151.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27337/">CVE-2022-27337 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27337">CVE-2022-27337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804894" comment="poppler-21.01.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804895" comment="poppler-cpp-21.01.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804896" comment="poppler-cpp-devel-21.01.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804897" comment="poppler-devel-21.01.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804898" comment="poppler-glib-21.01.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804899" comment="poppler-glib-devel-21.01.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804900" comment="poppler-qt5-21.01.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804901" comment="poppler-qt5-devel-21.01.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804902" comment="poppler-utils-21.01.0-13.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3692" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918/" source="CVE"/>
		<reference ref_id="CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996/" source="CVE"/>
		<reference ref_id="CVE-2022-2850" ref_url="https://www.suse.com/security/cve/CVE-2022-2850/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8162.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8162.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0918">CVE-2022-0918 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0996">CVE-2022-0996 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2850/">CVE-2022-2850 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2850">CVE-2022-2850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804903" comment="389-ds-base-2.1.3-4.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804904" comment="389-ds-base-libs-2.1.3-4.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804905" comment="python3-lib389-2.1.3-4.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3693" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-0561" ref_url="https://www.suse.com/security/cve/CVE-2022-0561/" source="CVE"/>
		<reference ref_id="CVE-2022-0562" ref_url="https://www.suse.com/security/cve/CVE-2022-0562/" source="CVE"/>
		<reference ref_id="CVE-2022-0865" ref_url="https://www.suse.com/security/cve/CVE-2022-0865/" source="CVE"/>
		<reference ref_id="CVE-2022-0891" ref_url="https://www.suse.com/security/cve/CVE-2022-0891/" source="CVE"/>
		<reference ref_id="CVE-2022-0908" ref_url="https://www.suse.com/security/cve/CVE-2022-0908/" source="CVE"/>
		<reference ref_id="CVE-2022-0909" ref_url="https://www.suse.com/security/cve/CVE-2022-0909/" source="CVE"/>
		<reference ref_id="CVE-2022-0924" ref_url="https://www.suse.com/security/cve/CVE-2022-0924/" source="CVE"/>
		<reference ref_id="CVE-2022-1354" ref_url="https://www.suse.com/security/cve/CVE-2022-1354/" source="CVE"/>
		<reference ref_id="CVE-2022-1355" ref_url="https://www.suse.com/security/cve/CVE-2022-1355/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8194.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8194.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0561/">CVE-2022-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0561">CVE-2022-0561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0562/">CVE-2022-0562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0562">CVE-2022-0562 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0865/">CVE-2022-0865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0865">CVE-2022-0865 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0891/">CVE-2022-0891 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0891">CVE-2022-0891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0908/">CVE-2022-0908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0908">CVE-2022-0908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0909/">CVE-2022-0909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0909">CVE-2022-0909 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0924/">CVE-2022-0924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0924">CVE-2022-0924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1354/">CVE-2022-1354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1354">CVE-2022-1354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1355/">CVE-2022-1355 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1355">CVE-2022-1355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">CVE-2022-22844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804906" comment="libtiff-4.4.0-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804907" comment="libtiff-devel-4.4.0-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804908" comment="libtiff-tools-4.4.0-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3694" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708/" source="CVE"/>
		<reference ref_id="CVE-2022-31625" ref_url="https://www.suse.com/security/cve/CVE-2022-31625/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8197.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8197.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21708">CVE-2021-21708 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31625/">CVE-2022-31625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31625">CVE-2022-31625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804909" comment="php-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804910" comment="php-bcmath-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804911" comment="php-cli-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804912" comment="php-common-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804913" comment="php-dba-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804914" comment="php-dbg-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804915" comment="php-devel-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804916" comment="php-embedded-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804917" comment="php-enchant-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804918" comment="php-ffi-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804919" comment="php-fpm-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804920" comment="php-gd-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804921" comment="php-gmp-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804922" comment="php-intl-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804923" comment="php-ldap-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804924" comment="php-mbstring-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804925" comment="php-mysqlnd-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804926" comment="php-odbc-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804927" comment="php-opcache-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804928" comment="php-pdo-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804929" comment="php-pgsql-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804930" comment="php-process-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804931" comment="php-snmp-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804932" comment="php-soap-8.0.20-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804933" comment="php-xml-8.0.20-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3695" version="1" class="patch">
	<metadata>
		<title>security update for openjpeg2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8207.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8207.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1122">CVE-2022-1122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804934" comment="openjpeg2-2.4.0-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804935" comment="openjpeg2-devel-2.4.0-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804936" comment="openjpeg2-tools-2.4.0-7.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3696" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-30550" ref_url="https://www.suse.com/security/cve/CVE-2022-30550/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8208.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8208.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-30550/">CVE-2022-30550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30550">CVE-2022-30550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804937" comment="dovecot-2.3.16-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804938" comment="dovecot-devel-2.3.16-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804939" comment="dovecot-mysql-2.3.16-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804940" comment="dovecot-pgsql-2.3.16-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804941" comment="dovecot-pigeonhole-2.3.16-7.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3697" version="1" class="patch">
	<metadata>
		<title>security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1328" ref_url="https://www.suse.com/security/cve/CVE-2022-1328/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8219.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8219.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1328/">CVE-2022-1328 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1328">CVE-2022-1328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804942" comment="mutt-2.2.6-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3698" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2319" ref_url="https://www.suse.com/security/cve/CVE-2022-2319/" source="CVE"/>
		<reference ref_id="CVE-2022-2320" ref_url="https://www.suse.com/security/cve/CVE-2022-2320/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8221.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8221.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2319/">CVE-2022-2319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2319">CVE-2022-2319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2320/">CVE-2022-2320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2320">CVE-2022-2320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804943" comment="xorg-x11-server-Xdmx-1.20.11-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804944" comment="xorg-x11-server-Xephyr-1.20.11-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804945" comment="xorg-x11-server-Xnest-1.20.11-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804946" comment="xorg-x11-server-Xorg-1.20.11-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804947" comment="xorg-x11-server-Xvfb-1.20.11-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804948" comment="xorg-x11-server-common-1.20.11-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804949" comment="xorg-x11-server-devel-1.20.11-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804950" comment="xorg-x11-server-source-1.20.11-11.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3699" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server-Xwayland (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2319" ref_url="https://www.suse.com/security/cve/CVE-2022-2319/" source="CVE"/>
		<reference ref_id="CVE-2022-2320" ref_url="https://www.suse.com/security/cve/CVE-2022-2320/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8222.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8222.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2319/">CVE-2022-2319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2319">CVE-2022-2319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2320/">CVE-2022-2320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2320">CVE-2022-2320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804951" comment="xorg-x11-server-Xwayland-21.1.3-3.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3700" version="1" class="patch">
	<metadata>
		<title>security update for python-lxml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2309" ref_url="https://www.suse.com/security/cve/CVE-2022-2309/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8226.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8226.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2309/">CVE-2022-2309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2309">CVE-2022-2309 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804952" comment="python3-lxml-4.6.5-3.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3701" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8250.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8250.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804953" comment="grafana-pcp-3.2.0-3.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3702" version="1" class="patch">
	<metadata>
		<title>security update for yajl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-24795" ref_url="https://www.suse.com/security/cve/CVE-2022-24795/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8252.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8252.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24795/">CVE-2022-24795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24795">CVE-2022-24795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804954" comment="yajl-2.1.0-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804955" comment="yajl-devel-2.1.0-21.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3703" version="1" class="patch">
	<metadata>
		<title>security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-3839" ref_url="https://www.suse.com/security/cve/CVE-2021-3839/" source="CVE"/>
		<reference ref_id="CVE-2022-2132" ref_url="https://www.suse.com/security/cve/CVE-2022-2132/" source="CVE"/>
		<reference ref_id="CVE-2022-28199" ref_url="https://www.suse.com/security/cve/CVE-2022-28199/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8263.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8263.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3839/">CVE-2021-3839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3839">CVE-2021-3839 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2132/">CVE-2022-2132 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2132">CVE-2022-2132 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28199/">CVE-2022-28199 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28199">CVE-2022-28199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804956" comment="dpdk-21.11.2-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804957" comment="dpdk-devel-21.11.2-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804958" comment="dpdk-doc-21.11.2-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804959" comment="dpdk-tools-21.11.2-1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3704" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-36516" ref_url="https://www.suse.com/security/cve/CVE-2020-36516/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-47099" ref_url="https://www.suse.com/security/cve/CVE-2021-47099/" source="CVE"/>
		<reference ref_id="CVE-2021-47103" ref_url="https://www.suse.com/security/cve/CVE-2021-47103/" source="CVE"/>
		<reference ref_id="CVE-2021-47373" ref_url="https://www.suse.com/security/cve/CVE-2021-47373/" source="CVE"/>
		<reference ref_id="CVE-2021-47378" ref_url="https://www.suse.com/security/cve/CVE-2021-47378/" source="CVE"/>
		<reference ref_id="CVE-2021-47455" ref_url="https://www.suse.com/security/cve/CVE-2021-47455/" source="CVE"/>
		<reference ref_id="CVE-2021-47556" ref_url="https://www.suse.com/security/cve/CVE-2021-47556/" source="CVE"/>
		<reference ref_id="CVE-2021-47572" ref_url="https://www.suse.com/security/cve/CVE-2021-47572/" source="CVE"/>
		<reference ref_id="CVE-2021-47580" ref_url="https://www.suse.com/security/cve/CVE-2021-47580/" source="CVE"/>
		<reference ref_id="CVE-2021-47639" ref_url="https://www.suse.com/security/cve/CVE-2021-47639/" source="CVE"/>
		<reference ref_id="CVE-2021-47646" ref_url="https://www.suse.com/security/cve/CVE-2021-47646/" source="CVE"/>
		<reference ref_id="CVE-2021-47649" ref_url="https://www.suse.com/security/cve/CVE-2021-47649/" source="CVE"/>
		<reference ref_id="CVE-2021-47657" ref_url="https://www.suse.com/security/cve/CVE-2021-47657/" source="CVE"/>
		<reference ref_id="CVE-2022-0168" ref_url="https://www.suse.com/security/cve/CVE-2022-0168/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1158" ref_url="https://www.suse.com/security/cve/CVE-2022-1158/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-1263" ref_url="https://www.suse.com/security/cve/CVE-2022-1263/" source="CVE"/>
		<reference ref_id="CVE-2022-1280" ref_url="https://www.suse.com/security/cve/CVE-2022-1280/" source="CVE"/>
		<reference ref_id="CVE-2022-1353" ref_url="https://www.suse.com/security/cve/CVE-2022-1353/" source="CVE"/>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<reference ref_id="CVE-2022-1852" ref_url="https://www.suse.com/security/cve/CVE-2022-1852/" source="CVE"/>
		<reference ref_id="CVE-2022-1998" ref_url="https://www.suse.com/security/cve/CVE-2022-1998/" source="CVE"/>
		<reference ref_id="CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368/" source="CVE"/>
		<reference ref_id="CVE-2022-20572" ref_url="https://www.suse.com/security/cve/CVE-2022-20572/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-21499" ref_url="https://www.suse.com/security/cve/CVE-2022-21499/" source="CVE"/>
		<reference ref_id="CVE-2022-2153" ref_url="https://www.suse.com/security/cve/CVE-2022-2153/" source="CVE"/>
		<reference ref_id="CVE-2022-23816" ref_url="https://www.suse.com/security/cve/CVE-2022-23816/" source="CVE"/>
		<reference ref_id="CVE-2022-23825" ref_url="https://www.suse.com/security/cve/CVE-2022-23825/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-2503" ref_url="https://www.suse.com/security/cve/CVE-2022-2503/" source="CVE"/>
		<reference ref_id="CVE-2022-2586" ref_url="https://www.suse.com/security/cve/CVE-2022-2586/" source="CVE"/>
		<reference ref_id="CVE-2022-26373" ref_url="https://www.suse.com/security/cve/CVE-2022-26373/" source="CVE"/>
		<reference ref_id="CVE-2022-2639" ref_url="https://www.suse.com/security/cve/CVE-2022-2639/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="CVE-2022-28693" ref_url="https://www.suse.com/security/cve/CVE-2022-28693/" source="CVE"/>
		<reference ref_id="CVE-2022-28893" ref_url="https://www.suse.com/security/cve/CVE-2022-28893/" source="CVE"/>
		<reference ref_id="CVE-2022-29581" ref_url="https://www.suse.com/security/cve/CVE-2022-29581/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-3107" ref_url="https://www.suse.com/security/cve/CVE-2022-3107/" source="CVE"/>
		<reference ref_id="CVE-2022-3108" ref_url="https://www.suse.com/security/cve/CVE-2022-3108/" source="CVE"/>
		<reference ref_id="CVE-2022-3239" ref_url="https://www.suse.com/security/cve/CVE-2022-3239/" source="CVE"/>
		<reference ref_id="CVE-2022-36946" ref_url="https://www.suse.com/security/cve/CVE-2022-36946/" source="CVE"/>
		<reference ref_id="CVE-2022-39190" ref_url="https://www.suse.com/security/cve/CVE-2022-39190/" source="CVE"/>
		<reference ref_id="CVE-2022-42432" ref_url="https://www.suse.com/security/cve/CVE-2022-42432/" source="CVE"/>
		<reference ref_id="CVE-2022-48735" ref_url="https://www.suse.com/security/cve/CVE-2022-48735/" source="CVE"/>
		<reference ref_id="CVE-2022-48738" ref_url="https://www.suse.com/security/cve/CVE-2022-48738/" source="CVE"/>
		<reference ref_id="CVE-2022-48765" ref_url="https://www.suse.com/security/cve/CVE-2022-48765/" source="CVE"/>
		<reference ref_id="CVE-2022-48786" ref_url="https://www.suse.com/security/cve/CVE-2022-48786/" source="CVE"/>
		<reference ref_id="CVE-2022-48866" ref_url="https://www.suse.com/security/cve/CVE-2022-48866/" source="CVE"/>
		<reference ref_id="CVE-2022-48905" ref_url="https://www.suse.com/security/cve/CVE-2022-48905/" source="CVE"/>
		<reference ref_id="CVE-2022-48912" ref_url="https://www.suse.com/security/cve/CVE-2022-48912/" source="CVE"/>
		<reference ref_id="CVE-2022-48918" ref_url="https://www.suse.com/security/cve/CVE-2022-48918/" source="CVE"/>
		<reference ref_id="CVE-2022-48921" ref_url="https://www.suse.com/security/cve/CVE-2022-48921/" source="CVE"/>
		<reference ref_id="CVE-2022-48936" ref_url="https://www.suse.com/security/cve/CVE-2022-48936/" source="CVE"/>
		<reference ref_id="CVE-2022-48943" ref_url="https://www.suse.com/security/cve/CVE-2022-48943/" source="CVE"/>
		<reference ref_id="CVE-2022-49057" ref_url="https://www.suse.com/security/cve/CVE-2022-49057/" source="CVE"/>
		<reference ref_id="CVE-2022-49060" ref_url="https://www.suse.com/security/cve/CVE-2022-49060/" source="CVE"/>
		<reference ref_id="CVE-2022-49066" ref_url="https://www.suse.com/security/cve/CVE-2022-49066/" source="CVE"/>
		<reference ref_id="CVE-2022-49086" ref_url="https://www.suse.com/security/cve/CVE-2022-49086/" source="CVE"/>
		<reference ref_id="CVE-2022-49090" ref_url="https://www.suse.com/security/cve/CVE-2022-49090/" source="CVE"/>
		<reference ref_id="CVE-2022-49093" ref_url="https://www.suse.com/security/cve/CVE-2022-49093/" source="CVE"/>
		<reference ref_id="CVE-2022-49098" ref_url="https://www.suse.com/security/cve/CVE-2022-49098/" source="CVE"/>
		<reference ref_id="CVE-2022-49107" ref_url="https://www.suse.com/security/cve/CVE-2022-49107/" source="CVE"/>
		<reference ref_id="CVE-2022-49109" ref_url="https://www.suse.com/security/cve/CVE-2022-49109/" source="CVE"/>
		<reference ref_id="CVE-2022-49122" ref_url="https://www.suse.com/security/cve/CVE-2022-49122/" source="CVE"/>
		<reference ref_id="CVE-2022-49123" ref_url="https://www.suse.com/security/cve/CVE-2022-49123/" source="CVE"/>
		<reference ref_id="CVE-2022-49129" ref_url="https://www.suse.com/security/cve/CVE-2022-49129/" source="CVE"/>
		<reference ref_id="CVE-2022-49130" ref_url="https://www.suse.com/security/cve/CVE-2022-49130/" source="CVE"/>
		<reference ref_id="CVE-2022-49142" ref_url="https://www.suse.com/security/cve/CVE-2022-49142/" source="CVE"/>
		<reference ref_id="CVE-2022-49145" ref_url="https://www.suse.com/security/cve/CVE-2022-49145/" source="CVE"/>
		<reference ref_id="CVE-2022-49147" ref_url="https://www.suse.com/security/cve/CVE-2022-49147/" source="CVE"/>
		<reference ref_id="CVE-2022-49152" ref_url="https://www.suse.com/security/cve/CVE-2022-49152/" source="CVE"/>
		<reference ref_id="CVE-2022-49153" ref_url="https://www.suse.com/security/cve/CVE-2022-49153/" source="CVE"/>
		<reference ref_id="CVE-2022-49156" ref_url="https://www.suse.com/security/cve/CVE-2022-49156/" source="CVE"/>
		<reference ref_id="CVE-2022-49158" ref_url="https://www.suse.com/security/cve/CVE-2022-49158/" source="CVE"/>
		<reference ref_id="CVE-2022-49160" ref_url="https://www.suse.com/security/cve/CVE-2022-49160/" source="CVE"/>
		<reference ref_id="CVE-2022-49175" ref_url="https://www.suse.com/security/cve/CVE-2022-49175/" source="CVE"/>
		<reference ref_id="CVE-2022-49179" ref_url="https://www.suse.com/security/cve/CVE-2022-49179/" source="CVE"/>
		<reference ref_id="CVE-2022-49180" ref_url="https://www.suse.com/security/cve/CVE-2022-49180/" source="CVE"/>
		<reference ref_id="CVE-2022-49188" ref_url="https://www.suse.com/security/cve/CVE-2022-49188/" source="CVE"/>
		<reference ref_id="CVE-2022-49199" ref_url="https://www.suse.com/security/cve/CVE-2022-49199/" source="CVE"/>
		<reference ref_id="CVE-2022-49215" ref_url="https://www.suse.com/security/cve/CVE-2022-49215/" source="CVE"/>
		<reference ref_id="CVE-2022-49227" ref_url="https://www.suse.com/security/cve/CVE-2022-49227/" source="CVE"/>
		<reference ref_id="CVE-2022-49228" ref_url="https://www.suse.com/security/cve/CVE-2022-49228/" source="CVE"/>
		<reference ref_id="CVE-2022-49229" ref_url="https://www.suse.com/security/cve/CVE-2022-49229/" source="CVE"/>
		<reference ref_id="CVE-2022-49235" ref_url="https://www.suse.com/security/cve/CVE-2022-49235/" source="CVE"/>
		<reference ref_id="CVE-2022-49238" ref_url="https://www.suse.com/security/cve/CVE-2022-49238/" source="CVE"/>
		<reference ref_id="CVE-2022-49247" ref_url="https://www.suse.com/security/cve/CVE-2022-49247/" source="CVE"/>
		<reference ref_id="CVE-2022-49253" ref_url="https://www.suse.com/security/cve/CVE-2022-49253/" source="CVE"/>
		<reference ref_id="CVE-2022-49259" ref_url="https://www.suse.com/security/cve/CVE-2022-49259/" source="CVE"/>
		<reference ref_id="CVE-2022-49263" ref_url="https://www.suse.com/security/cve/CVE-2022-49263/" source="CVE"/>
		<reference ref_id="CVE-2022-49264" ref_url="https://www.suse.com/security/cve/CVE-2022-49264/" source="CVE"/>
		<reference ref_id="CVE-2022-49265" ref_url="https://www.suse.com/security/cve/CVE-2022-49265/" source="CVE"/>
		<reference ref_id="CVE-2022-49268" ref_url="https://www.suse.com/security/cve/CVE-2022-49268/" source="CVE"/>
		<reference ref_id="CVE-2022-49270" ref_url="https://www.suse.com/security/cve/CVE-2022-49270/" source="CVE"/>
		<reference ref_id="CVE-2022-49272" ref_url="https://www.suse.com/security/cve/CVE-2022-49272/" source="CVE"/>
		<reference ref_id="CVE-2022-49281" ref_url="https://www.suse.com/security/cve/CVE-2022-49281/" source="CVE"/>
		<reference ref_id="CVE-2022-49288" ref_url="https://www.suse.com/security/cve/CVE-2022-49288/" source="CVE"/>
		<reference ref_id="CVE-2022-49290" ref_url="https://www.suse.com/security/cve/CVE-2022-49290/" source="CVE"/>
		<reference ref_id="CVE-2022-49291" ref_url="https://www.suse.com/security/cve/CVE-2022-49291/" source="CVE"/>
		<reference ref_id="CVE-2022-49292" ref_url="https://www.suse.com/security/cve/CVE-2022-49292/" source="CVE"/>
		<reference ref_id="CVE-2022-49297" ref_url="https://www.suse.com/security/cve/CVE-2022-49297/" source="CVE"/>
		<reference ref_id="CVE-2022-49306" ref_url="https://www.suse.com/security/cve/CVE-2022-49306/" source="CVE"/>
		<reference ref_id="CVE-2022-49325" ref_url="https://www.suse.com/security/cve/CVE-2022-49325/" source="CVE"/>
		<reference ref_id="CVE-2022-49330" ref_url="https://www.suse.com/security/cve/CVE-2022-49330/" source="CVE"/>
		<reference ref_id="CVE-2022-49332" ref_url="https://www.suse.com/security/cve/CVE-2022-49332/" source="CVE"/>
		<reference ref_id="CVE-2022-49334" ref_url="https://www.suse.com/security/cve/CVE-2022-49334/" source="CVE"/>
		<reference ref_id="CVE-2022-49340" ref_url="https://www.suse.com/security/cve/CVE-2022-49340/" source="CVE"/>
		<reference ref_id="CVE-2022-49343" ref_url="https://www.suse.com/security/cve/CVE-2022-49343/" source="CVE"/>
		<reference ref_id="CVE-2022-49347" ref_url="https://www.suse.com/security/cve/CVE-2022-49347/" source="CVE"/>
		<reference ref_id="CVE-2022-49348" ref_url="https://www.suse.com/security/cve/CVE-2022-49348/" source="CVE"/>
		<reference ref_id="CVE-2022-49349" ref_url="https://www.suse.com/security/cve/CVE-2022-49349/" source="CVE"/>
		<reference ref_id="CVE-2022-49374" ref_url="https://www.suse.com/security/cve/CVE-2022-49374/" source="CVE"/>
		<reference ref_id="CVE-2022-49378" ref_url="https://www.suse.com/security/cve/CVE-2022-49378/" source="CVE"/>
		<reference ref_id="CVE-2022-49389" ref_url="https://www.suse.com/security/cve/CVE-2022-49389/" source="CVE"/>
		<reference ref_id="CVE-2022-49394" ref_url="https://www.suse.com/security/cve/CVE-2022-49394/" source="CVE"/>
		<reference ref_id="CVE-2022-49398" ref_url="https://www.suse.com/security/cve/CVE-2022-49398/" source="CVE"/>
		<reference ref_id="CVE-2022-49404" ref_url="https://www.suse.com/security/cve/CVE-2022-49404/" source="CVE"/>
		<reference ref_id="CVE-2022-49408" ref_url="https://www.suse.com/security/cve/CVE-2022-49408/" source="CVE"/>
		<reference ref_id="CVE-2022-49409" ref_url="https://www.suse.com/security/cve/CVE-2022-49409/" source="CVE"/>
		<reference ref_id="CVE-2022-49411" ref_url="https://www.suse.com/security/cve/CVE-2022-49411/" source="CVE"/>
		<reference ref_id="CVE-2022-49412" ref_url="https://www.suse.com/security/cve/CVE-2022-49412/" source="CVE"/>
		<reference ref_id="CVE-2022-49413" ref_url="https://www.suse.com/security/cve/CVE-2022-49413/" source="CVE"/>
		<reference ref_id="CVE-2022-49418" ref_url="https://www.suse.com/security/cve/CVE-2022-49418/" source="CVE"/>
		<reference ref_id="CVE-2022-49426" ref_url="https://www.suse.com/security/cve/CVE-2022-49426/" source="CVE"/>
		<reference ref_id="CVE-2022-49433" ref_url="https://www.suse.com/security/cve/CVE-2022-49433/" source="CVE"/>
		<reference ref_id="CVE-2022-49440" ref_url="https://www.suse.com/security/cve/CVE-2022-49440/" source="CVE"/>
		<reference ref_id="CVE-2022-49451" ref_url="https://www.suse.com/security/cve/CVE-2022-49451/" source="CVE"/>
		<reference ref_id="CVE-2022-49465" ref_url="https://www.suse.com/security/cve/CVE-2022-49465/" source="CVE"/>
		<reference ref_id="CVE-2022-49504" ref_url="https://www.suse.com/security/cve/CVE-2022-49504/" source="CVE"/>
		<reference ref_id="CVE-2022-49515" ref_url="https://www.suse.com/security/cve/CVE-2022-49515/" source="CVE"/>
		<reference ref_id="CVE-2022-49531" ref_url="https://www.suse.com/security/cve/CVE-2022-49531/" source="CVE"/>
		<reference ref_id="CVE-2022-49534" ref_url="https://www.suse.com/security/cve/CVE-2022-49534/" source="CVE"/>
		<reference ref_id="CVE-2022-49536" ref_url="https://www.suse.com/security/cve/CVE-2022-49536/" source="CVE"/>
		<reference ref_id="CVE-2022-49537" ref_url="https://www.suse.com/security/cve/CVE-2022-49537/" source="CVE"/>
		<reference ref_id="CVE-2022-49538" ref_url="https://www.suse.com/security/cve/CVE-2022-49538/" source="CVE"/>
		<reference ref_id="CVE-2022-49543" ref_url="https://www.suse.com/security/cve/CVE-2022-49543/" source="CVE"/>
		<reference ref_id="CVE-2022-49545" ref_url="https://www.suse.com/security/cve/CVE-2022-49545/" source="CVE"/>
		<reference ref_id="CVE-2022-49557" ref_url="https://www.suse.com/security/cve/CVE-2022-49557/" source="CVE"/>
		<reference ref_id="CVE-2022-49559" ref_url="https://www.suse.com/security/cve/CVE-2022-49559/" source="CVE"/>
		<reference ref_id="CVE-2022-49561" ref_url="https://www.suse.com/security/cve/CVE-2022-49561/" source="CVE"/>
		<reference ref_id="CVE-2022-49584" ref_url="https://www.suse.com/security/cve/CVE-2022-49584/" source="CVE"/>
		<reference ref_id="CVE-2022-49605" ref_url="https://www.suse.com/security/cve/CVE-2022-49605/" source="CVE"/>
		<reference ref_id="CVE-2022-49606" ref_url="https://www.suse.com/security/cve/CVE-2022-49606/" source="CVE"/>
		<reference ref_id="CVE-2022-49615" ref_url="https://www.suse.com/security/cve/CVE-2022-49615/" source="CVE"/>
		<reference ref_id="CVE-2022-49625" ref_url="https://www.suse.com/security/cve/CVE-2022-49625/" source="CVE"/>
		<reference ref_id="CVE-2022-49626" ref_url="https://www.suse.com/security/cve/CVE-2022-49626/" source="CVE"/>
		<reference ref_id="CVE-2022-49663" ref_url="https://www.suse.com/security/cve/CVE-2022-49663/" source="CVE"/>
		<reference ref_id="CVE-2022-49664" ref_url="https://www.suse.com/security/cve/CVE-2022-49664/" source="CVE"/>
		<reference ref_id="CVE-2022-49669" ref_url="https://www.suse.com/security/cve/CVE-2022-49669/" source="CVE"/>
		<reference ref_id="CVE-2022-49671" ref_url="https://www.suse.com/security/cve/CVE-2022-49671/" source="CVE"/>
		<reference ref_id="CVE-2022-49673" ref_url="https://www.suse.com/security/cve/CVE-2022-49673/" source="CVE"/>
		<reference ref_id="CVE-2022-49691" ref_url="https://www.suse.com/security/cve/CVE-2022-49691/" source="CVE"/>
		<reference ref_id="CVE-2022-49695" ref_url="https://www.suse.com/security/cve/CVE-2022-49695/" source="CVE"/>
		<reference ref_id="CVE-2022-49697" ref_url="https://www.suse.com/security/cve/CVE-2022-49697/" source="CVE"/>
		<reference ref_id="CVE-2022-49698" ref_url="https://www.suse.com/security/cve/CVE-2022-49698/" source="CVE"/>
		<reference ref_id="CVE-2022-49707" ref_url="https://www.suse.com/security/cve/CVE-2022-49707/" source="CVE"/>
		<reference ref_id="CVE-2022-49708" ref_url="https://www.suse.com/security/cve/CVE-2022-49708/" source="CVE"/>
		<reference ref_id="CVE-2022-49710" ref_url="https://www.suse.com/security/cve/CVE-2022-49710/" source="CVE"/>
		<reference ref_id="CVE-2022-49732" ref_url="https://www.suse.com/security/cve/CVE-2022-49732/" source="CVE"/>
		<reference ref_id="CVE-2022-50000" ref_url="https://www.suse.com/security/cve/CVE-2022-50000/" source="CVE"/>
		<reference ref_id="CVE-2022-50001" ref_url="https://www.suse.com/security/cve/CVE-2022-50001/" source="CVE"/>
		<reference ref_id="CVE-2022-50027" ref_url="https://www.suse.com/security/cve/CVE-2022-50027/" source="CVE"/>
		<reference ref_id="CVE-2022-50030" ref_url="https://www.suse.com/security/cve/CVE-2022-50030/" source="CVE"/>
		<reference ref_id="CVE-2022-50048" ref_url="https://www.suse.com/security/cve/CVE-2022-50048/" source="CVE"/>
		<reference ref_id="CVE-2022-50084" ref_url="https://www.suse.com/security/cve/CVE-2022-50084/" source="CVE"/>
		<reference ref_id="CVE-2022-50085" ref_url="https://www.suse.com/security/cve/CVE-2022-50085/" source="CVE"/>
		<reference ref_id="CVE-2022-50092" ref_url="https://www.suse.com/security/cve/CVE-2022-50092/" source="CVE"/>
		<reference ref_id="CVE-2022-50095" ref_url="https://www.suse.com/security/cve/CVE-2022-50095/" source="CVE"/>
		<reference ref_id="CVE-2022-50115" ref_url="https://www.suse.com/security/cve/CVE-2022-50115/" source="CVE"/>
		<reference ref_id="CVE-2022-50178" ref_url="https://www.suse.com/security/cve/CVE-2022-50178/" source="CVE"/>
		<reference ref_id="CVE-2022-50179" ref_url="https://www.suse.com/security/cve/CVE-2022-50179/" source="CVE"/>
		<reference ref_id="CVE-2022-50187" ref_url="https://www.suse.com/security/cve/CVE-2022-50187/" source="CVE"/>
		<reference ref_id="CVE-2022-50212" ref_url="https://www.suse.com/security/cve/CVE-2022-50212/" source="CVE"/>
		<reference ref_id="CVE-2022-50213" ref_url="https://www.suse.com/security/cve/CVE-2022-50213/" source="CVE"/>
		<reference ref_id="CVE-2022-50506" ref_url="https://www.suse.com/security/cve/CVE-2022-50506/" source="CVE"/>
		<reference ref_id="CVE-2022-50536" ref_url="https://www.suse.com/security/cve/CVE-2022-50536/" source="CVE"/>
		<reference ref_id="CVE-2023-1095" ref_url="https://www.suse.com/security/cve/CVE-2023-1095/" source="CVE"/>
		<reference ref_id="CVE-2023-2008" ref_url="https://www.suse.com/security/cve/CVE-2023-2008/" source="CVE"/>
		<reference ref_id="CVE-2023-28410" ref_url="https://www.suse.com/security/cve/CVE-2023-28410/" source="CVE"/>
		<reference ref_id="CVE-2023-4387" ref_url="https://www.suse.com/security/cve/CVE-2023-4387/" source="CVE"/>
		<reference ref_id="CVE-2023-53181" ref_url="https://www.suse.com/security/cve/CVE-2023-53181/" source="CVE"/>
		<reference ref_id="CVE-2023-53660" ref_url="https://www.suse.com/security/cve/CVE-2023-53660/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8267.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8267.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36516/">CVE-2020-36516 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36516">CVE-2020-36516 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47099/">CVE-2021-47099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47099">CVE-2021-47099 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47103/">CVE-2021-47103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47103">CVE-2021-47103 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47373/">CVE-2021-47373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47373">CVE-2021-47373 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47378/">CVE-2021-47378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47378">CVE-2021-47378 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47455/">CVE-2021-47455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47455">CVE-2021-47455 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47556/">CVE-2021-47556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47556">CVE-2021-47556 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47572/">CVE-2021-47572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47572">CVE-2021-47572 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47580/">CVE-2021-47580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47580">CVE-2021-47580 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47639/">CVE-2021-47639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47639">CVE-2021-47639 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47646/">CVE-2021-47646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47646">CVE-2021-47646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47649/">CVE-2021-47649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47649">CVE-2021-47649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47657/">CVE-2021-47657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47657">CVE-2021-47657 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0168/">CVE-2022-0168 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0854">CVE-2022-0854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1158/">CVE-2022-1158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1158">CVE-2022-1158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1263/">CVE-2022-1263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1263">CVE-2022-1263 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1280/">CVE-2022-1280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1280">CVE-2022-1280 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1353/">CVE-2022-1353 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1852/">CVE-2022-1852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1998/">CVE-2022-1998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1998">CVE-2022-1998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20572/">CVE-2022-20572 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20572">CVE-2022-20572 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21499/">CVE-2022-21499 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2153/">CVE-2022-2153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2153">CVE-2022-2153 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23816/">CVE-2022-23816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23825/">CVE-2022-23825 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23825">CVE-2022-23825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2503/">CVE-2022-2503 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2503">CVE-2022-2503 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2586/">CVE-2022-2586 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2586">CVE-2022-2586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26373/">CVE-2022-26373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2639/">CVE-2022-2639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2639">CVE-2022-2639 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28693/">CVE-2022-28693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-28693">CVE-2022-28693 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28893/">CVE-2022-28893 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29581/">CVE-2022-29581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29581">CVE-2022-29581 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3107/">CVE-2022-3107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3107">CVE-2022-3107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3108/">CVE-2022-3108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3108">CVE-2022-3108 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3239/">CVE-2022-3239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3239">CVE-2022-3239 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36946/">CVE-2022-36946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39190/">CVE-2022-39190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39190">CVE-2022-39190 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42432/">CVE-2022-42432 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42432">CVE-2022-42432 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48735/">CVE-2022-48735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48735">CVE-2022-48735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48738/">CVE-2022-48738 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48738">CVE-2022-48738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48765/">CVE-2022-48765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48765">CVE-2022-48765 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-48786/">CVE-2022-48786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48786">CVE-2022-48786 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48866/">CVE-2022-48866 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48866">CVE-2022-48866 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48905/">CVE-2022-48905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48905">CVE-2022-48905 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48912/">CVE-2022-48912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48912">CVE-2022-48912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48918/">CVE-2022-48918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48918">CVE-2022-48918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48921/">CVE-2022-48921 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48921">CVE-2022-48921 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48936/">CVE-2022-48936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48936">CVE-2022-48936 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48943/">CVE-2022-48943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48943">CVE-2022-48943 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49057/">CVE-2022-49057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49057">CVE-2022-49057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49060/">CVE-2022-49060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49060">CVE-2022-49060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49066/">CVE-2022-49066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49066">CVE-2022-49066 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49086/">CVE-2022-49086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49086">CVE-2022-49086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49090/">CVE-2022-49090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49090">CVE-2022-49090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49093/">CVE-2022-49093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49093">CVE-2022-49093 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49098/">CVE-2022-49098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49098">CVE-2022-49098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49107/">CVE-2022-49107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49107">CVE-2022-49107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49109/">CVE-2022-49109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49109">CVE-2022-49109 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49122/">CVE-2022-49122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49122">CVE-2022-49122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49123/">CVE-2022-49123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49123">CVE-2022-49123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49129/">CVE-2022-49129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49129">CVE-2022-49129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49130/">CVE-2022-49130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49130">CVE-2022-49130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49142/">CVE-2022-49142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49142">CVE-2022-49142 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49145/">CVE-2022-49145 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49145">CVE-2022-49145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49147/">CVE-2022-49147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49147">CVE-2022-49147 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49152/">CVE-2022-49152 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49152">CVE-2022-49152 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49153/">CVE-2022-49153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49153">CVE-2022-49153 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49156/">CVE-2022-49156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49156">CVE-2022-49156 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49158/">CVE-2022-49158 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49158">CVE-2022-49158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49160/">CVE-2022-49160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49160">CVE-2022-49160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49175/">CVE-2022-49175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49175">CVE-2022-49175 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49179/">CVE-2022-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49179">CVE-2022-49179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49180/">CVE-2022-49180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49180">CVE-2022-49180 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49188/">CVE-2022-49188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49188">CVE-2022-49188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49199/">CVE-2022-49199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49199">CVE-2022-49199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49215/">CVE-2022-49215 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49215">CVE-2022-49215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49227/">CVE-2022-49227 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49227">CVE-2022-49227 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49228/">CVE-2022-49228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49228">CVE-2022-49228 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49229/">CVE-2022-49229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49229">CVE-2022-49229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49235/">CVE-2022-49235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49235">CVE-2022-49235 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49238/">CVE-2022-49238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49238">CVE-2022-49238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49247/">CVE-2022-49247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49247">CVE-2022-49247 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49253/">CVE-2022-49253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49253">CVE-2022-49253 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49259/">CVE-2022-49259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49259">CVE-2022-49259 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49263/">CVE-2022-49263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49263">CVE-2022-49263 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49264/">CVE-2022-49264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49264">CVE-2022-49264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49265/">CVE-2022-49265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49265">CVE-2022-49265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49268/">CVE-2022-49268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49268">CVE-2022-49268 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49270/">CVE-2022-49270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49270">CVE-2022-49270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49272/">CVE-2022-49272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49272">CVE-2022-49272 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49281/">CVE-2022-49281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49281">CVE-2022-49281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49288/">CVE-2022-49288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49288">CVE-2022-49288 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49290/">CVE-2022-49290 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49290">CVE-2022-49290 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49291/">CVE-2022-49291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49291">CVE-2022-49291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49292/">CVE-2022-49292 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49292">CVE-2022-49292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49297/">CVE-2022-49297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49297">CVE-2022-49297 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49306/">CVE-2022-49306 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49306">CVE-2022-49306 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49325/">CVE-2022-49325 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49325">CVE-2022-49325 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49330/">CVE-2022-49330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49330">CVE-2022-49330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49332/">CVE-2022-49332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49332">CVE-2022-49332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49334/">CVE-2022-49334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49334">CVE-2022-49334 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49340/">CVE-2022-49340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49340">CVE-2022-49340 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49343/">CVE-2022-49343 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49343">CVE-2022-49343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49347/">CVE-2022-49347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49347">CVE-2022-49347 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49348/">CVE-2022-49348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49348">CVE-2022-49348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49349/">CVE-2022-49349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49349">CVE-2022-49349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49374/">CVE-2022-49374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49374">CVE-2022-49374 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49378/">CVE-2022-49378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49378">CVE-2022-49378 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49389/">CVE-2022-49389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49389">CVE-2022-49389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49394/">CVE-2022-49394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49394">CVE-2022-49394 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49398/">CVE-2022-49398 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49398">CVE-2022-49398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49404/">CVE-2022-49404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49404">CVE-2022-49404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49408/">CVE-2022-49408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49408">CVE-2022-49408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49409/">CVE-2022-49409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49409">CVE-2022-49409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49411/">CVE-2022-49411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49411">CVE-2022-49411 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49412/">CVE-2022-49412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49412">CVE-2022-49412 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49413/">CVE-2022-49413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49413">CVE-2022-49413 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49418/">CVE-2022-49418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49418">CVE-2022-49418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49426/">CVE-2022-49426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49426">CVE-2022-49426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49433/">CVE-2022-49433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49433">CVE-2022-49433 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49440/">CVE-2022-49440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49440">CVE-2022-49440 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49451/">CVE-2022-49451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49451">CVE-2022-49451 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49465/">CVE-2022-49465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49465">CVE-2022-49465 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49504/">CVE-2022-49504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49504">CVE-2022-49504 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49515/">CVE-2022-49515 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49515">CVE-2022-49515 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49531/">CVE-2022-49531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49531">CVE-2022-49531 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49534/">CVE-2022-49534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49534">CVE-2022-49534 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49536/">CVE-2022-49536 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49536">CVE-2022-49536 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49537/">CVE-2022-49537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49537">CVE-2022-49537 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49538/">CVE-2022-49538 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49538">CVE-2022-49538 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49543/">CVE-2022-49543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49543">CVE-2022-49543 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49545/">CVE-2022-49545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49545">CVE-2022-49545 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49557/">CVE-2022-49557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49557">CVE-2022-49557 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49559/">CVE-2022-49559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49559">CVE-2022-49559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49561/">CVE-2022-49561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49561">CVE-2022-49561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49584/">CVE-2022-49584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49584">CVE-2022-49584 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49605/">CVE-2022-49605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49605">CVE-2022-49605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49606/">CVE-2022-49606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49606">CVE-2022-49606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49615/">CVE-2022-49615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49615">CVE-2022-49615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49625/">CVE-2022-49625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49625">CVE-2022-49625 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49626/">CVE-2022-49626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49626">CVE-2022-49626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49663/">CVE-2022-49663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49663">CVE-2022-49663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49664/">CVE-2022-49664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49664">CVE-2022-49664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49669/">CVE-2022-49669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49669">CVE-2022-49669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49671/">CVE-2022-49671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49671">CVE-2022-49671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49673/">CVE-2022-49673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49673">CVE-2022-49673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49691/">CVE-2022-49691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49691">CVE-2022-49691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49695/">CVE-2022-49695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49695">CVE-2022-49695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49697/">CVE-2022-49697 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49697">CVE-2022-49697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49698/">CVE-2022-49698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49698">CVE-2022-49698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49707/">CVE-2022-49707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49707">CVE-2022-49707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49708/">CVE-2022-49708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49708">CVE-2022-49708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49710/">CVE-2022-49710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49710">CVE-2022-49710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49732/">CVE-2022-49732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49732">CVE-2022-49732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50000/">CVE-2022-50000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50000">CVE-2022-50000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50001/">CVE-2022-50001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50001">CVE-2022-50001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50027/">CVE-2022-50027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50027">CVE-2022-50027 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50030/">CVE-2022-50030 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50030">CVE-2022-50030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50048/">CVE-2022-50048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50048">CVE-2022-50048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50084/">CVE-2022-50084 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50084">CVE-2022-50084 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50085/">CVE-2022-50085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50085">CVE-2022-50085 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50092/">CVE-2022-50092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50092">CVE-2022-50092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50095/">CVE-2022-50095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50095">CVE-2022-50095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50115/">CVE-2022-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50115">CVE-2022-50115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50178/">CVE-2022-50178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50178">CVE-2022-50178 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50179/">CVE-2022-50179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50179">CVE-2022-50179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50187/">CVE-2022-50187 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50187">CVE-2022-50187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50212/">CVE-2022-50212 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50212">CVE-2022-50212 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50213/">CVE-2022-50213 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50213">CVE-2022-50213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50506/">CVE-2022-50506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50506">CVE-2022-50506 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50536/">CVE-2022-50536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50536">CVE-2022-50536 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1095/">CVE-2023-1095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1095">CVE-2023-1095 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2008/">CVE-2023-2008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2008">CVE-2023-2008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28410/">CVE-2023-28410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4387/">CVE-2023-4387 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53181/">CVE-2023-53181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53181">CVE-2023-53181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53660/">CVE-2023-53660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53660">CVE-2023-53660 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3705" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8291.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8291.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804982" comment="rsync-3.2.3-18.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804983" comment="rsync-daemon-3.2.3-18.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3706" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-27775" ref_url="https://www.suse.com/security/cve/CVE-2022-27775/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8299.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8299.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27775/">CVE-2022-27775 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27775">CVE-2022-27775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804984" comment="curl-7.76.1-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804985" comment="curl-minimal-7.76.1-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804986" comment="libcurl-7.76.1-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804987" comment="libcurl-devel-7.76.1-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804988" comment="libcurl-minimal-7.76.1-19.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3707" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-32742" ref_url="https://www.suse.com/security/cve/CVE-2022-32742/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8317.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8317.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32742/">CVE-2022-32742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32742">CVE-2022-32742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804989" comment="ctdb-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804990" comment="libsmbclient-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804991" comment="libsmbclient-devel-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804992" comment="libwbclient-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804993" comment="libwbclient-devel-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804994" comment="python3-samba-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804995" comment="samba-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804996" comment="samba-client-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804997" comment="samba-client-libs-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804998" comment="samba-common-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804999" comment="samba-common-libs-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805000" comment="samba-common-tools-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805001" comment="samba-devel-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805002" comment="samba-krb5-printing-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805003" comment="samba-libs-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805004" comment="samba-pidl-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805005" comment="samba-test-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805006" comment="samba-test-libs-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805007" comment="samba-vfs-iouring-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805008" comment="samba-winbind-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805009" comment="samba-winbind-clients-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805010" comment="samba-winbind-krb5-locator-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805011" comment="samba-winbind-modules-4.16.4-101.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805012" comment="samba-winexe-4.16.4-101.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3708" version="1" class="patch">
	<metadata>
		<title>security update for libldb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-32746" ref_url="https://www.suse.com/security/cve/CVE-2022-32746/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8318.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8318.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32746/">CVE-2022-32746 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32746">CVE-2022-32746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805013" comment="ldb-tools-2.5.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805014" comment="libldb-2.5.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805015" comment="libldb-devel-2.5.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805016" comment="python3-ldb-2.5.2-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3709" version="1" class="patch">
	<metadata>
		<title>security update for freetype (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-27404" ref_url="https://www.suse.com/security/cve/CVE-2022-27404/" source="CVE"/>
		<reference ref_id="CVE-2022-27405" ref_url="https://www.suse.com/security/cve/CVE-2022-27405/" source="CVE"/>
		<reference ref_id="CVE-2022-27406" ref_url="https://www.suse.com/security/cve/CVE-2022-27406/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8340.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8340.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27404/">CVE-2022-27404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27404">CVE-2022-27404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27405/">CVE-2022-27405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27405">CVE-2022-27405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27406/">CVE-2022-27406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27406">CVE-2022-27406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805017" comment="freetype-2.10.4-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805018" comment="freetype-devel-2.10.4-9.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3710" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8353.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8353.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805019" comment="python-unversioned-command-3.9.14-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805020" comment="python3-3.9.14-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805021" comment="python3-debug-3.9.14-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805022" comment="python3-devel-3.9.14-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805023" comment="python3-idle-3.9.14-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805024" comment="python3-libs-3.9.14-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805025" comment="python3-test-3.9.14-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805026" comment="python3-tkinter-3.9.14-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3711" version="1" class="patch">
	<metadata>
		<title>security update for e2fsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8361.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8361.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805027" comment="e2fsprogs-1.46.5-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805028" comment="e2fsprogs-devel-1.46.5-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805029" comment="e2fsprogs-libs-1.46.5-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805030" comment="libcom_err-1.46.5-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805031" comment="libcom_err-devel-1.46.5-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805032" comment="libss-1.46.5-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3712" version="1" class="patch">
	<metadata>
		<title>security update for harfbuzz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-33068" ref_url="https://www.suse.com/security/cve/CVE-2022-33068/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8384.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8384.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-33068/">CVE-2022-33068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33068">CVE-2022-33068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805033" comment="harfbuzz-2.7.4-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805034" comment="harfbuzz-devel-2.7.4-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805035" comment="harfbuzz-icu-2.7.4-8.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3713" version="1" class="patch">
	<metadata>
		<title>security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8385.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8385.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805036" comment="dhcp-client-4.4.2-17.b1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805037" comment="dhcp-common-4.4.2-17.b1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805038" comment="dhcp-relay-4.4.2-17.b1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805039" comment="dhcp-server-4.4.2-17.b1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3714" version="1" class="patch">
	<metadata>
		<title>security update for logrotate (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1348" ref_url="https://www.suse.com/security/cve/CVE-2022-1348/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8393.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8393.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1348/">CVE-2022-1348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1348">CVE-2022-1348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805040" comment="logrotate-3.18.0-7.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3715" version="1" class="patch">
	<metadata>
		<title>security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-46828" ref_url="https://www.suse.com/security/cve/CVE-2021-46828/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8400.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8400.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46828/">CVE-2021-46828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46828">CVE-2021-46828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805041" comment="libtirpc-1.3.3-0.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805042" comment="libtirpc-devel-1.3.3-0.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3716" version="1" class="patch">
	<metadata>
		<title>security update for mingw-gcc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-46195" ref_url="https://www.suse.com/security/cve/CVE-2021-46195/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8415.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8415.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46195/">CVE-2021-46195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46195">CVE-2021-46195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805043" comment="mingw32-cpp-12.0.1-11.2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805044" comment="mingw32-gcc-12.0.1-11.2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805045" comment="mingw32-gcc-c++-12.0.1-11.2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805046" comment="mingw32-libgcc-12.0.1-11.2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805047" comment="mingw64-cpp-12.0.1-11.2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805048" comment="mingw64-gcc-12.0.1-11.2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805049" comment="mingw64-gcc-c++-12.0.1-11.2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805050" comment="mingw64-libgcc-12.0.1-11.2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3717" version="1" class="patch">
	<metadata>
		<title>security update for mingw-glib2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-28153" ref_url="https://www.suse.com/security/cve/CVE-2021-28153/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8418.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8418.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28153/">CVE-2021-28153 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28153">CVE-2021-28153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805051" comment="mingw32-glib2-2.70.1-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805052" comment="mingw32-glib2-static-2.70.1-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805053" comment="mingw64-glib2-2.70.1-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805054" comment="mingw64-glib2-static-2.70.1-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3718" version="1" class="patch">
	<metadata>
		<title>security update for mingw-zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8420.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8420.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805055" comment="mingw32-zlib-1.2.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805056" comment="mingw32-zlib-static-1.2.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805057" comment="mingw64-zlib-1.2.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805058" comment="mingw64-zlib-static-1.2.12-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3719" version="1" class="patch">
	<metadata>
		<title>security update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2989" ref_url="https://www.suse.com/security/cve/CVE-2022-2989/" source="CVE"/>
		<reference ref_id="CVE-2022-2990" ref_url="https://www.suse.com/security/cve/CVE-2022-2990/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8431.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8431.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2989/">CVE-2022-2989 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2989">CVE-2022-2989 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2990/">CVE-2022-2990 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2990">CVE-2022-2990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805059" comment="podman-4.2.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805060" comment="podman-catatonit-4.2.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805061" comment="podman-docker-4.2.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805062" comment="podman-gvproxy-4.2.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805063" comment="podman-plugins-4.2.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805064" comment="podman-remote-4.2.0-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805065" comment="podman-tests-4.2.0-7.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3720" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41032" ref_url="https://www.suse.com/security/cve/CVE-2022-41032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8434.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8434.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41032/">CVE-2022-41032 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41032">CVE-2022-41032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805066" comment="aspnetcore-runtime-7.0-7.0.0-0.5.rc2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805067" comment="aspnetcore-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805068" comment="dotnet-apphost-pack-7.0-7.0.0-0.5.rc2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805069" comment="dotnet-host-7.0.0-0.5.rc2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805070" comment="dotnet-hostfxr-7.0-7.0.0-0.5.rc2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805071" comment="dotnet-runtime-7.0-7.0.0-0.5.rc2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805072" comment="dotnet-sdk-7.0-7.0.100-0.5.rc2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805073" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.100-0.5.rc2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805074" comment="dotnet-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805075" comment="dotnet-templates-7.0-7.0.100-0.5.rc2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805076" comment="netstandard-targeting-pack-2.1-7.0.100-0.5.rc2.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3721" version="1" class="patch">
	<metadata>
		<title>security update for keylime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3500" ref_url="https://www.suse.com/security/cve/CVE-2022-3500/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8444.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8444.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3500/">CVE-2022-3500 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3500">CVE-2022-3500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805077" comment="keylime-6.5.1-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805078" comment="keylime-base-6.5.1-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805079" comment="keylime-registrar-6.5.1-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805080" comment="keylime-selinux-6.5.1-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805081" comment="keylime-tenant-6.5.1-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805082" comment="keylime-verifier-6.5.1-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805083" comment="python3-keylime-6.5.1-1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3722" version="1" class="patch">
	<metadata>
		<title>security update for device-mapper-multipath (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3787" ref_url="https://www.suse.com/security/cve/CVE-2022-3787/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8453.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8453.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3787/">CVE-2022-3787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3787">CVE-2022-3787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805084" comment="device-mapper-multipath-0.8.7-12.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805085" comment="device-mapper-multipath-devel-0.8.7-12.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805086" comment="device-mapper-multipath-libs-0.8.7-12.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805087" comment="kpartx-0.8.7-12.el9_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3723" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-42919" ref_url="https://www.suse.com/security/cve/CVE-2022-42919/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8493.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8493.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42919/">CVE-2022-42919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42919">CVE-2022-42919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805088" comment="python-unversioned-command-3.9.14-1.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805089" comment="python3-3.9.14-1.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805090" comment="python3-debug-3.9.14-1.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805091" comment="python3-devel-3.9.14-1.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805092" comment="python3-idle-3.9.14-1.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805093" comment="python3-libs-3.9.14-1.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805094" comment="python3-test-3.9.14-1.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805095" comment="python3-tkinter-3.9.14-1.el9_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3724" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8561.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8561.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3725" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8580.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8580.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3726" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8637.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8637.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805098" comment="krb5-devel-1.19.1-24.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805099" comment="krb5-libs-1.19.1-24.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805100" comment="krb5-pkinit-1.19.1-24.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805101" comment="krb5-server-1.19.1-24.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805102" comment="krb5-server-ldap-1.19.1-24.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805103" comment="krb5-workstation-1.19.1-24.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805104" comment="libkadm5-1.19.1-24.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3727" version="1" class="patch">
	<metadata>
		<title>security update for varnish (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-45060" ref_url="https://www.suse.com/security/cve/CVE-2022-45060/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8643.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8643.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45060/">CVE-2022-45060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45060">CVE-2022-45060 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805105" comment="varnish-6.6.2-2.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805106" comment="varnish-devel-6.6.2-2.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805107" comment="varnish-docs-6.6.2-2.el9_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3728" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3517" ref_url="https://www.suse.com/security/cve/CVE-2022-3517/" source="CVE"/>
		<reference ref_id="CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8832.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8832.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3517/">CVE-2022-3517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3517">CVE-2022-3517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43548">CVE-2022-43548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805108" comment="nodejs-18.12.1-1.module+el9.1.0.z+17326+318294bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805109" comment="nodejs-devel-18.12.1-1.module+el9.1.0.z+17326+318294bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805110" comment="nodejs-docs-18.12.1-1.module+el9.1.0.z+17326+318294bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805111" comment="nodejs-full-i18n-18.12.1-1.module+el9.1.0.z+17326+318294bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805112" comment="nodejs-nodemon-2.0.20-1.module+el9.1.0.z+17326+318294bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805115" comment="npm-8.19.2-1.18.12.1.1.module+el9.1.0.z+17326+318294bb is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3729" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:9065.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:9065.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805116" comment="firefox-102.6.0-1.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3730" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-45414" ref_url="https://www.suse.com/security/cve/CVE-2022-45414/" source="CVE"/>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:9080.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:9080.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-45414/">CVE-2022-45414 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45414">CVE-2022-45414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805117" comment="thunderbird-102.6.0-2.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3731" version="1" class="patch">
	<metadata>
		<title>security update for bcel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-42920" ref_url="https://www.suse.com/security/cve/CVE-2022-42920/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0005.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0005.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42920/">CVE-2022-42920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42920">CVE-2022-42920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805118" comment="bcel-6.4.1-9.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3732" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-21538" ref_url="https://www.suse.com/security/cve/CVE-2023-21538/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0077.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0077.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21538/">CVE-2023-21538 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21538">CVE-2023-21538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805119" comment="aspnetcore-runtime-6.0-6.0.13-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805120" comment="aspnetcore-targeting-pack-6.0-6.0.13-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805121" comment="dotnet-apphost-pack-6.0-6.0.13-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805122" comment="dotnet-hostfxr-6.0-6.0.13-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805123" comment="dotnet-runtime-6.0-6.0.13-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805124" comment="dotnet-sdk-6.0-6.0.113-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805125" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805126" comment="dotnet-targeting-pack-6.0-6.0.13-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805127" comment="dotnet-templates-6.0-6.0.113-1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3733" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0194.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0194.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805128" comment="java-17-openjdk-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805129" comment="java-17-openjdk-demo-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805130" comment="java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805131" comment="java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805132" comment="java-17-openjdk-devel-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805133" comment="java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805134" comment="java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805135" comment="java-17-openjdk-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805136" comment="java-17-openjdk-headless-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805137" comment="java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805138" comment="java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805139" comment="java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805140" comment="java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805141" comment="java-17-openjdk-jmods-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805142" comment="java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805143" comment="java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805144" comment="java-17-openjdk-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805145" comment="java-17-openjdk-src-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805146" comment="java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805147" comment="java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805148" comment="java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805149" comment="java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805150" comment="java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3734" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0202.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0202.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805151" comment="java-11-openjdk-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805152" comment="java-11-openjdk-demo-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805153" comment="java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805154" comment="java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805155" comment="java-11-openjdk-devel-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805156" comment="java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805157" comment="java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805158" comment="java-11-openjdk-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805159" comment="java-11-openjdk-headless-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805160" comment="java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805161" comment="java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805162" comment="java-11-openjdk-javadoc-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805163" comment="java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805164" comment="java-11-openjdk-jmods-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805165" comment="java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805166" comment="java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805167" comment="java-11-openjdk-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805168" comment="java-11-openjdk-src-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805169" comment="java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805170" comment="java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805171" comment="java-11-openjdk-static-libs-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805172" comment="java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805173" comment="java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3735" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-21830" ref_url="https://www.suse.com/security/cve/CVE-2023-21830/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0210.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0210.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21830/">CVE-2023-21830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21830">CVE-2023-21830 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805174" comment="java-1.8.0-openjdk-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805175" comment="java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805176" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805177" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805178" comment="java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805179" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805180" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805181" comment="java-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805182" comment="java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805183" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805184" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805185" comment="java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805186" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805187" comment="java-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805188" comment="java-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805189" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805190" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3736" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-22809" ref_url="https://www.suse.com/security/cve/CVE-2023-22809/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0282.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0282.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22809/">CVE-2023-22809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22809">CVE-2023-22809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805191" comment="sudo-1.9.5p2-7.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805192" comment="sudo-python-plugin-1.9.5p2-7.el9_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3737" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871/" source="CVE"/>
		<reference ref_id="CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877/" source="CVE"/>
		<reference ref_id="CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598/" source="CVE"/>
		<reference ref_id="CVE-2023-23599" ref_url="https://www.suse.com/security/cve/CVE-2023-23599/" source="CVE"/>
		<reference ref_id="CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601/" source="CVE"/>
		<reference ref_id="CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602/" source="CVE"/>
		<reference ref_id="CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603/" source="CVE"/>
		<reference ref_id="CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0285.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0285.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23599/">CVE-2023-23599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23599">CVE-2023-23599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805193" comment="firefox-102.7.0-1.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3738" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2056" ref_url="https://www.suse.com/security/cve/CVE-2022-2056/" source="CVE"/>
		<reference ref_id="CVE-2022-2057" ref_url="https://www.suse.com/security/cve/CVE-2022-2057/" source="CVE"/>
		<reference ref_id="CVE-2022-2058" ref_url="https://www.suse.com/security/cve/CVE-2022-2058/" source="CVE"/>
		<reference ref_id="CVE-2022-2519" ref_url="https://www.suse.com/security/cve/CVE-2022-2519/" source="CVE"/>
		<reference ref_id="CVE-2022-2520" ref_url="https://www.suse.com/security/cve/CVE-2022-2520/" source="CVE"/>
		<reference ref_id="CVE-2022-2521" ref_url="https://www.suse.com/security/cve/CVE-2022-2521/" source="CVE"/>
		<reference ref_id="CVE-2022-2953" ref_url="https://www.suse.com/security/cve/CVE-2022-2953/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0302.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0302.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2056/">CVE-2022-2056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2056">CVE-2022-2056 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2057/">CVE-2022-2057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2057">CVE-2022-2057 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2058/">CVE-2022-2058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2058">CVE-2022-2058 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2519/">CVE-2022-2519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2519">CVE-2022-2519 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2520/">CVE-2022-2520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2520">CVE-2022-2520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2521/">CVE-2022-2521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2521">CVE-2022-2521 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2953/">CVE-2022-2953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2953">CVE-2022-2953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805194" comment="libtiff-4.4.0-5.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805195" comment="libtiff-devel-4.4.0-5.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805196" comment="libtiff-tools-4.4.0-5.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3739" version="1" class="patch">
	<metadata>
		<title>security update for usbguard (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2019-25058" ref_url="https://www.suse.com/security/cve/CVE-2019-25058/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0303.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0303.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25058/">CVE-2019-25058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25058">CVE-2019-25058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805197" comment="usbguard-1.0.0-10.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805198" comment="usbguard-dbus-1.0.0-10.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805199" comment="usbguard-notifier-1.0.0-10.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805200" comment="usbguard-selinux-1.0.0-10.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805201" comment="usbguard-tools-1.0.0-10.el9_1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3740" version="1" class="patch">
	<metadata>
		<title>security update for postgresql-jdbc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-31197" ref_url="https://www.suse.com/security/cve/CVE-2022-31197/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0318.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0318.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31197/">CVE-2022-31197 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31197">CVE-2022-31197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805202" comment="postgresql-jdbc-42.2.18-6.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3741" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2022-3517" ref_url="https://www.suse.com/security/cve/CVE-2022-3517/" source="CVE"/>
		<reference ref_id="CVE-2022-35256" ref_url="https://www.suse.com/security/cve/CVE-2022-35256/" source="CVE"/>
		<reference ref_id="CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0321.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0321.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">CVE-2021-44906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3517/">CVE-2022-3517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3517">CVE-2022-3517 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35256/">CVE-2022-35256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35256">CVE-2022-35256 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43548">CVE-2022-43548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805203" comment="nodejs-16.18.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805204" comment="nodejs-docs-16.18.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805205" comment="nodejs-full-i18n-16.18.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805206" comment="nodejs-libs-16.18.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805207" comment="nodejs-nodemon-2.0.20-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805208" comment="npm-8.19.2-1.16.18.1.3.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3742" version="1" class="patch">
	<metadata>
		<title>security update for go-toolset (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-2879" ref_url="https://www.suse.com/security/cve/CVE-2022-2879/" source="CVE"/>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0328.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0328.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2879/">CVE-2022-2879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2879">CVE-2022-2879 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805209" comment="go-toolset-1.18.9-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805210" comment="golang-1.18.9-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805211" comment="golang-bin-1.18.9-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805212" comment="golang-docs-1.18.9-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805213" comment="golang-misc-1.18.9-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805214" comment="golang-race-1.18.9-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805215" comment="golang-src-1.18.9-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805216" comment="golang-tests-1.18.9-1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3743" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-32221" ref_url="https://www.suse.com/security/cve/CVE-2022-32221/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0333.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0333.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32221/">CVE-2022-32221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805217" comment="curl-7.76.1-19.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805218" comment="curl-minimal-7.76.1-19.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805219" comment="libcurl-7.76.1-19.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805220" comment="libcurl-devel-7.76.1-19.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805221" comment="libcurl-minimal-7.76.1-19.el9_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3744" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2959" ref_url="https://www.suse.com/security/cve/CVE-2022-2959/" source="CVE"/>
		<reference ref_id="CVE-2022-2964" ref_url="https://www.suse.com/security/cve/CVE-2022-2964/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="CVE-2022-3077" ref_url="https://www.suse.com/security/cve/CVE-2022-3077/" source="CVE"/>
		<reference ref_id="CVE-2022-4139" ref_url="https://www.suse.com/security/cve/CVE-2022-4139/" source="CVE"/>
		<reference ref_id="CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945/" source="CVE"/>
		<reference ref_id="CVE-2022-50053" ref_url="https://www.suse.com/security/cve/CVE-2022-50053/" source="CVE"/>
		<reference ref_id="CVE-2022-50054" ref_url="https://www.suse.com/security/cve/CVE-2022-50054/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0334.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0334.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2959/">CVE-2022-2959 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2959">CVE-2022-2959 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2964/">CVE-2022-2964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2964">CVE-2022-2964 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3077/">CVE-2022-3077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3077">CVE-2022-3077 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4139/">CVE-2022-4139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4139">CVE-2022-4139 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50053/">CVE-2022-50053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50053">CVE-2022-50053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50054/">CVE-2022-50054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50054">CVE-2022-50054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805222" comment="bpftool-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805223" comment="kernel-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805224" comment="kernel-abi-stablelists-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805225" comment="kernel-core-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805226" comment="kernel-cross-headers-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805227" comment="kernel-debug-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805228" comment="kernel-debug-core-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805231" comment="kernel-debug-modules-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805232" comment="kernel-debug-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805235" comment="kernel-doc-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805236" comment="kernel-headers-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805237" comment="kernel-modules-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805238" comment="kernel-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805239" comment="kernel-tools-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805240" comment="kernel-tools-libs-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805242" comment="perf-5.14.0-162.12.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805243" comment="python3-perf-5.14.0-162.12.1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3745" version="1" class="patch">
	<metadata>
		<title>security update for dbus (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-42010" ref_url="https://www.suse.com/security/cve/CVE-2022-42010/" source="CVE"/>
		<reference ref_id="CVE-2022-42011" ref_url="https://www.suse.com/security/cve/CVE-2022-42011/" source="CVE"/>
		<reference ref_id="CVE-2022-42012" ref_url="https://www.suse.com/security/cve/CVE-2022-42012/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0335.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0335.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42010/">CVE-2022-42010 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42010">CVE-2022-42010 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42011/">CVE-2022-42011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42011">CVE-2022-42011 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42012/">CVE-2022-42012 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42012">CVE-2022-42012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805244" comment="dbus-1.12.20-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805245" comment="dbus-common-1.12.20-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805246" comment="dbus-daemon-1.12.20-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805247" comment="dbus-devel-1.12.20-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805248" comment="dbus-libs-1.12.20-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805249" comment="dbus-tools-1.12.20-7.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805250" comment="dbus-x11-1.12.20-7.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3746" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3821" ref_url="https://www.suse.com/security/cve/CVE-2022-3821/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0336.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0336.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3821/">CVE-2022-3821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3821">CVE-2022-3821 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805251" comment="systemd-250-12.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805252" comment="systemd-container-250-12.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805253" comment="systemd-devel-250-12.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805254" comment="systemd-journal-remote-250-12.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805255" comment="systemd-libs-250-12.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805256" comment="systemd-oomd-250-12.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805257" comment="systemd-pam-250-12.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805258" comment="systemd-resolved-250-12.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805259" comment="systemd-rpm-macros-250-12.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805260" comment="systemd-udev-250-12.el9_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3747" version="1" class="patch">
	<metadata>
		<title>security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-43680" ref_url="https://www.suse.com/security/cve/CVE-2022-43680/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0337.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0337.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43680/">CVE-2022-43680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43680">CVE-2022-43680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805261" comment="expat-2.4.9-1.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805262" comment="expat-devel-2.4.9-1.el9_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3748" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-40303" ref_url="https://www.suse.com/security/cve/CVE-2022-40303/" source="CVE"/>
		<reference ref_id="CVE-2022-40304" ref_url="https://www.suse.com/security/cve/CVE-2022-40304/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0338.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0338.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40303/">CVE-2022-40303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40303">CVE-2022-40303 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40304/">CVE-2022-40304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805263" comment="libxml2-2.9.13-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805264" comment="libxml2-devel-2.9.13-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805265" comment="python3-libxml2-2.9.13-3.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3749" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-35737" ref_url="https://www.suse.com/security/cve/CVE-2022-35737/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0339.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0339.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35737/">CVE-2022-35737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35737">CVE-2022-35737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805266" comment="sqlite-3.34.1-6.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805267" comment="sqlite-devel-3.34.1-6.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805268" comment="sqlite-libs-3.34.1-6.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3750" version="1" class="patch">
	<metadata>
		<title>security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3715" ref_url="https://www.suse.com/security/cve/CVE-2022-3715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0340.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0340.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3715/">CVE-2022-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805269" comment="bash-5.1.8-6.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805270" comment="bash-devel-5.1.8-6.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3751" version="1" class="patch">
	<metadata>
		<title>security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-46848" ref_url="https://www.suse.com/security/cve/CVE-2021-46848/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0343.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0343.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46848/">CVE-2021-46848 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46848">CVE-2021-46848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805271" comment="libtasn1-4.16.0-8.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805272" comment="libtasn1-devel-4.16.0-8.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805273" comment="libtasn1-tools-4.16.0-8.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3752" version="1" class="patch">
	<metadata>
		<title>security update for libXpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-44617" ref_url="https://www.suse.com/security/cve/CVE-2022-44617/" source="CVE"/>
		<reference ref_id="CVE-2022-46285" ref_url="https://www.suse.com/security/cve/CVE-2022-46285/" source="CVE"/>
		<reference ref_id="CVE-2022-4883" ref_url="https://www.suse.com/security/cve/CVE-2022-4883/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0383.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0383.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44617/">CVE-2022-44617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44617">CVE-2022-44617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46285/">CVE-2022-46285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46285">CVE-2022-46285 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4883/">CVE-2022-4883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4883">CVE-2022-4883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805274" comment="libXpm-3.5.13-8.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805275" comment="libXpm-devel-3.5.13-8.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3753" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871/" source="CVE"/>
		<reference ref_id="CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877/" source="CVE"/>
		<reference ref_id="CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598/" source="CVE"/>
		<reference ref_id="CVE-2023-23599" ref_url="https://www.suse.com/security/cve/CVE-2023-23599/" source="CVE"/>
		<reference ref_id="CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601/" source="CVE"/>
		<reference ref_id="CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602/" source="CVE"/>
		<reference ref_id="CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603/" source="CVE"/>
		<reference ref_id="CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0476.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0476.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23599/">CVE-2023-23599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23599">CVE-2023-23599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805276" comment="thunderbird-102.7.1-1.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3754" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0430" ref_url="https://www.suse.com/security/cve/CVE-2023-0430/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0608.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0608.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0430/">CVE-2023-0430 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0430">CVE-2023-0430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805277" comment="thunderbird-102.7.1-2.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3755" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-23521" ref_url="https://www.suse.com/security/cve/CVE-2022-23521/" source="CVE"/>
		<reference ref_id="CVE-2022-41903" ref_url="https://www.suse.com/security/cve/CVE-2022-41903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0611.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0611.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23521/">CVE-2022-23521 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41903/">CVE-2022-41903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805278" comment="git-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805279" comment="git-all-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805280" comment="git-core-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805281" comment="git-core-doc-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805282" comment="git-credential-libsecret-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805283" comment="git-daemon-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805284" comment="git-email-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805285" comment="git-gui-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805286" comment="git-instaweb-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805287" comment="git-subtree-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805288" comment="git-svn-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805289" comment="gitk-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805290" comment="gitweb-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805291" comment="perl-Git-2.31.1-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805292" comment="perl-Git-SVN-2.31.1-3.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3756" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0622.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0622.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805293" comment="tigervnc-1.12.0-5.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805294" comment="tigervnc-icons-1.12.0-5.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805295" comment="tigervnc-license-1.12.0-5.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805296" comment="tigervnc-selinux-1.12.0-5.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805297" comment="tigervnc-server-1.12.0-5.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805298" comment="tigervnc-server-minimal-1.12.0-5.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805299" comment="tigervnc-server-module-1.12.0-5.el9_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3757" version="1" class="patch">
	<metadata>
		<title>security update for libksba (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-47629" ref_url="https://www.suse.com/security/cve/CVE-2022-47629/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0626.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0626.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47629/">CVE-2022-47629 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805300" comment="libksba-1.5.1-6.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805301" comment="libksba-devel-1.5.1-6.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3758" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2601" ref_url="https://www.suse.com/security/cve/CVE-2022-2601/" source="CVE"/>
		<reference ref_id="CVE-2022-3775" ref_url="https://www.suse.com/security/cve/CVE-2022-3775/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0752.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0752.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2601/">CVE-2022-2601 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3775/">CVE-2022-3775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775">CVE-2022-3775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805302" comment="grub2-common-2.06-46.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805303" comment="grub2-efi-x64-2.06-46.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805304" comment="grub2-efi-x64-cdboot-2.06-46.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805305" comment="grub2-efi-x64-modules-2.06-46.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805306" comment="grub2-pc-2.06-46.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805307" comment="grub2-pc-modules-2.06-46.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805308" comment="grub2-tools-2.06-46.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805309" comment="grub2-tools-efi-2.06-46.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805310" comment="grub2-tools-extra-2.06-46.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805311" comment="grub2-tools-minimal-2.06-46.el9_1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3759" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728/" source="CVE"/>
		<reference ref_id="CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729/" source="CVE"/>
		<reference ref_id="CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730/" source="CVE"/>
		<reference ref_id="CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732/" source="CVE"/>
		<reference ref_id="CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735/" source="CVE"/>
		<reference ref_id="CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737/" source="CVE"/>
		<reference ref_id="CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739/" source="CVE"/>
		<reference ref_id="CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742/" source="CVE"/>
		<reference ref_id="CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743/" source="CVE"/>
		<reference ref_id="CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744/" source="CVE"/>
		<reference ref_id="CVE-2023-25746" ref_url="https://www.suse.com/security/cve/CVE-2023-25746/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0810.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0810.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25746/">CVE-2023-25746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25746">CVE-2023-25746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805312" comment="firefox-102.8.0-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805313" comment="firefox-x11-102.8.0-2.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3760" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0616" ref_url="https://www.suse.com/security/cve/CVE-2023-0616/" source="CVE"/>
		<reference ref_id="CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728/" source="CVE"/>
		<reference ref_id="CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729/" source="CVE"/>
		<reference ref_id="CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730/" source="CVE"/>
		<reference ref_id="CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732/" source="CVE"/>
		<reference ref_id="CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735/" source="CVE"/>
		<reference ref_id="CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737/" source="CVE"/>
		<reference ref_id="CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739/" source="CVE"/>
		<reference ref_id="CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742/" source="CVE"/>
		<reference ref_id="CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743/" source="CVE"/>
		<reference ref_id="CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744/" source="CVE"/>
		<reference ref_id="CVE-2023-25746" ref_url="https://www.suse.com/security/cve/CVE-2023-25746/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0824.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0824.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0616/">CVE-2023-0616 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0616">CVE-2023-0616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25746/">CVE-2023-25746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25746">CVE-2023-25746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805314" comment="thunderbird-102.8.0-2.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3761" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-23529" ref_url="https://www.suse.com/security/cve/CVE-2023-23529/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0903.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0903.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23529/">CVE-2023-23529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23529">CVE-2023-23529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805315" comment="webkit2gtk3-2.36.7-1.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805316" comment="webkit2gtk3-devel-2.36.7-1.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805317" comment="webkit2gtk3-jsc-2.36.7-1.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805318" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3762" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-4203" ref_url="https://www.suse.com/security/cve/CVE-2022-4203/" source="CVE"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="CVE-2022-4450" ref_url="https://www.suse.com/security/cve/CVE-2022-4450/" source="CVE"/>
		<reference ref_id="CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215/" source="CVE"/>
		<reference ref_id="CVE-2023-0216" ref_url="https://www.suse.com/security/cve/CVE-2023-0216/" source="CVE"/>
		<reference ref_id="CVE-2023-0217" ref_url="https://www.suse.com/security/cve/CVE-2023-0217/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<reference ref_id="CVE-2023-0401" ref_url="https://www.suse.com/security/cve/CVE-2023-0401/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0946.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0946.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4203/">CVE-2022-4203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4203">CVE-2022-4203 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4450/">CVE-2022-4450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4450">CVE-2022-4450 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0216/">CVE-2023-0216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0216">CVE-2023-0216 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0217/">CVE-2023-0217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0217">CVE-2023-0217 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0401/">CVE-2023-0401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0401">CVE-2023-0401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805319" comment="openssl-3.0.1-47.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805320" comment="openssl-devel-3.0.1-47.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805321" comment="openssl-libs-3.0.1-47.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805322" comment="openssl-perl-3.0.1-47.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3763" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2873" ref_url="https://www.suse.com/security/cve/CVE-2022-2873/" source="CVE"/>
		<reference ref_id="CVE-2022-3564" ref_url="https://www.suse.com/security/cve/CVE-2022-3564/" source="CVE"/>
		<reference ref_id="CVE-2022-4378" ref_url="https://www.suse.com/security/cve/CVE-2022-4378/" source="CVE"/>
		<reference ref_id="CVE-2022-4379" ref_url="https://www.suse.com/security/cve/CVE-2022-4379/" source="CVE"/>
		<reference ref_id="CVE-2022-49944" ref_url="https://www.suse.com/security/cve/CVE-2022-49944/" source="CVE"/>
		<reference ref_id="CVE-2023-0179" ref_url="https://www.suse.com/security/cve/CVE-2023-0179/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0951.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0951.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2873/">CVE-2022-2873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2873">CVE-2022-2873 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3564/">CVE-2022-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4378/">CVE-2022-4378 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4379/">CVE-2022-4379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49944/">CVE-2022-49944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49944">CVE-2022-49944 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0179/">CVE-2023-0179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805323" comment="bpftool-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805324" comment="kernel-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805325" comment="kernel-abi-stablelists-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805326" comment="kernel-core-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805327" comment="kernel-cross-headers-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805328" comment="kernel-debug-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805329" comment="kernel-debug-core-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805332" comment="kernel-debug-modules-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805333" comment="kernel-debug-modules-extra-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805336" comment="kernel-doc-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805337" comment="kernel-headers-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805338" comment="kernel-modules-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805339" comment="kernel-modules-extra-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805340" comment="kernel-tools-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805341" comment="kernel-tools-libs-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805343" comment="perf-5.14.0-162.18.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805344" comment="python3-perf-5.14.0-162.18.1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3764" version="1" class="patch">
	<metadata>
		<title>security update for python-setuptools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0952.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0952.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805345" comment="python3-setuptools-53.0.0-10.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805346" comment="python3-setuptools-wheel-53.0.0-10.el9_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3765" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0953.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0953.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805347" comment="python-unversioned-command-3.9.14-1.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805348" comment="python3-3.9.14-1.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805349" comment="python3-debug-3.9.14-1.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805350" comment="python3-devel-3.9.14-1.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805351" comment="python3-idle-3.9.14-1.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805352" comment="python3-libs-3.9.14-1.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805353" comment="python3-test-3.9.14-1.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805354" comment="python3-tkinter-3.9.14-1.el9_1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3766" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-4415" ref_url="https://www.suse.com/security/cve/CVE-2022-4415/" source="CVE"/>
		<reference ref_id="CVE-2022-45873" ref_url="https://www.suse.com/security/cve/CVE-2022-45873/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0954.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0954.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4415/">CVE-2022-4415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4415">CVE-2022-4415 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45873/">CVE-2022-45873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45873">CVE-2022-45873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805355" comment="systemd-250-12.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805356" comment="systemd-container-250-12.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805357" comment="systemd-devel-250-12.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805358" comment="systemd-journal-remote-250-12.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805359" comment="systemd-libs-250-12.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805360" comment="systemd-oomd-250-12.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805361" comment="systemd-pam-250-12.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805362" comment="systemd-resolved-250-12.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805363" comment="systemd-rpm-macros-250-12.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805364" comment="systemd-udev-250-12.el9_1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3767" version="1" class="patch">
	<metadata>
		<title>security update for lua (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-43519" ref_url="https://www.suse.com/security/cve/CVE-2021-43519/" source="CVE"/>
		<reference ref_id="CVE-2021-44964" ref_url="https://www.suse.com/security/cve/CVE-2021-44964/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0957.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0957.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43519/">CVE-2021-43519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43519">CVE-2021-43519 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44964/">CVE-2021-44964 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44964">CVE-2021-44964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805365" comment="lua-5.4.4-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805366" comment="lua-devel-5.4.4-2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805367" comment="lua-libs-5.4.4-2.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3768" version="1" class="patch">
	<metadata>
		<title>security update for vim (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-47024" ref_url="https://www.suse.com/security/cve/CVE-2022-47024/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0958.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0958.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-47024/">CVE-2022-47024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47024">CVE-2022-47024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805368" comment="vim-X11-8.2.2637-20.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805369" comment="vim-common-8.2.2637-20.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805370" comment="vim-enhanced-8.2.2637-20.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805371" comment="vim-filesystem-8.2.2637-20.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805372" comment="vim-minimal-8.2.2637-20.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3769" version="1" class="patch">
	<metadata>
		<title>security update for tar (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-48303" ref_url="https://www.suse.com/security/cve/CVE-2022-48303/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0959.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0959.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48303/">CVE-2022-48303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48303">CVE-2022-48303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805373" comment="tar-1.34-6.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3770" version="1" class="patch">
	<metadata>
		<title>security update for php (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-31628" ref_url="https://www.suse.com/security/cve/CVE-2022-31628/" source="CVE"/>
		<reference ref_id="CVE-2022-31629" ref_url="https://www.suse.com/security/cve/CVE-2022-31629/" source="CVE"/>
		<reference ref_id="CVE-2022-31630" ref_url="https://www.suse.com/security/cve/CVE-2022-31630/" source="CVE"/>
		<reference ref_id="CVE-2022-31631" ref_url="https://www.suse.com/security/cve/CVE-2022-31631/" source="CVE"/>
		<reference ref_id="CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0965.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0965.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31628/">CVE-2022-31628 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31628">CVE-2022-31628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31629/">CVE-2022-31629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31629">CVE-2022-31629 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31630/">CVE-2022-31630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31630">CVE-2022-31630 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31631/">CVE-2022-31631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-31631">CVE-2022-31631 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805374" comment="php-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805375" comment="php-bcmath-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805376" comment="php-cli-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805377" comment="php-common-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805378" comment="php-dba-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805379" comment="php-dbg-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805380" comment="php-devel-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805381" comment="php-embedded-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805382" comment="php-enchant-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805383" comment="php-ffi-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805384" comment="php-fpm-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805385" comment="php-gd-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805386" comment="php-gmp-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805387" comment="php-intl-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805388" comment="php-ldap-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805389" comment="php-mbstring-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805390" comment="php-mysqlnd-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805391" comment="php-odbc-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805392" comment="php-opcache-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805393" comment="php-pdo-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805394" comment="php-pgsql-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805395" comment="php-process-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805396" comment="php-snmp-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805397" comment="php-soap-8.0.27-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805398" comment="php-xml-8.0.27-1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3771" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2006-20001" ref_url="https://www.suse.com/security/cve/CVE-2006-20001/" source="CVE"/>
		<reference ref_id="CVE-2022-36760" ref_url="https://www.suse.com/security/cve/CVE-2022-36760/" source="CVE"/>
		<reference ref_id="CVE-2022-37436" ref_url="https://www.suse.com/security/cve/CVE-2022-37436/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0970.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0970.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2006-20001/">CVE-2006-20001 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-20001">CVE-2006-20001 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36760/">CVE-2022-36760 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36760">CVE-2022-36760 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-37436/">CVE-2022-37436 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37436">CVE-2022-37436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805399" comment="httpd-2.4.53-7.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805400" comment="httpd-core-2.4.53-7.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805401" comment="httpd-devel-2.4.53-7.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805402" comment="httpd-filesystem-2.4.53-7.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805403" comment="httpd-manual-2.4.53-7.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805404" comment="httpd-tools-2.4.53-7.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805405" comment="mod_ldap-2.4.53-7.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805406" comment="mod_lua-2.4.53-7.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805407" comment="mod_proxy_html-2.4.53-7.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805408" comment="mod_session-2.4.53-7.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805409" comment="mod_ssl-2.4.53-7.el9_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3772" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-45442" ref_url="https://www.suse.com/security/cve/CVE-2022-45442/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0974.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0974.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-45442/">CVE-2022-45442 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45442">CVE-2022-45442 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805410" comment="pcs-0.11.3-4.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805411" comment="pcs-snmp-0.11.3-4.el9_1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3773" version="1" class="patch">
	<metadata>
		<title>security update for pesign (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3560" ref_url="https://www.suse.com/security/cve/CVE-2022-3560/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1067.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1067.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3560/">CVE-2022-3560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3560">CVE-2022-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805412" comment="pesign-115-6.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3774" version="1" class="patch">
	<metadata>
		<title>security update for libjpeg-turbo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-46822" ref_url="https://www.suse.com/security/cve/CVE-2021-46822/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1068.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1068.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46822/">CVE-2021-46822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46822">CVE-2021-46822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805413" comment="libjpeg-turbo-2.0.90-6.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805414" comment="libjpeg-turbo-devel-2.0.90-6.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805415" comment="libjpeg-turbo-utils-2.0.90-6.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805416" comment="turbojpeg-2.0.90-6.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805417" comment="turbojpeg-devel-2.0.90-6.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3775" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0361" ref_url="https://www.suse.com/security/cve/CVE-2023-0361/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1141.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1141.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0361/">CVE-2023-0361 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0361">CVE-2023-0361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805418" comment="gnutls-3.7.6-18.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805419" comment="gnutls-c++-3.7.6-18.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805420" comment="gnutls-dane-3.7.6-18.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805421" comment="gnutls-devel-3.7.6-18.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805422" comment="gnutls-utils-3.7.6-18.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3776" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751/" source="CVE"/>
		<reference ref_id="CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752/" source="CVE"/>
		<reference ref_id="CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162/" source="CVE"/>
		<reference ref_id="CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164/" source="CVE"/>
		<reference ref_id="CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1337.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1337.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805423" comment="firefox-102.9.0-3.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805424" comment="firefox-x11-102.9.0-3.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3777" version="1" class="patch">
	<metadata>
		<title>security update for nss (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1368.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1368.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805425" comment="nspr-4.34.0-17.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805426" comment="nspr-devel-4.34.0-17.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805427" comment="nss-3.79.0-17.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805428" comment="nss-devel-3.79.0-17.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805429" comment="nss-softokn-3.79.0-17.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805430" comment="nss-softokn-devel-3.79.0-17.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805431" comment="nss-softokn-freebl-3.79.0-17.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805432" comment="nss-softokn-freebl-devel-3.79.0-17.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805433" comment="nss-sysinit-3.79.0-17.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805434" comment="nss-tools-3.79.0-17.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805435" comment="nss-util-3.79.0-17.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805436" comment="nss-util-devel-3.79.0-17.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3778" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751/" source="CVE"/>
		<reference ref_id="CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752/" source="CVE"/>
		<reference ref_id="CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162/" source="CVE"/>
		<reference ref_id="CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164/" source="CVE"/>
		<reference ref_id="CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1407.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1407.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805437" comment="thunderbird-102.9.0-1.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3779" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-4269" ref_url="https://www.suse.com/security/cve/CVE-2022-4269/" source="CVE"/>
		<reference ref_id="CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744/" source="CVE"/>
		<reference ref_id="CVE-2022-50425" ref_url="https://www.suse.com/security/cve/CVE-2022-50425/" source="CVE"/>
		<reference ref_id="CVE-2023-0266" ref_url="https://www.suse.com/security/cve/CVE-2023-0266/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1470.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1470.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4269/">CVE-2022-4269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50425/">CVE-2022-50425 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50425">CVE-2022-50425 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0266/">CVE-2023-0266 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0266">CVE-2023-0266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805438" comment="bpftool-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805439" comment="kernel-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805440" comment="kernel-abi-stablelists-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805441" comment="kernel-core-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805442" comment="kernel-cross-headers-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805443" comment="kernel-debug-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805444" comment="kernel-debug-core-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805447" comment="kernel-debug-modules-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805448" comment="kernel-debug-modules-extra-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805451" comment="kernel-doc-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805452" comment="kernel-headers-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805453" comment="kernel-modules-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805454" comment="kernel-modules-extra-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805455" comment="kernel-tools-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805456" comment="kernel-tools-libs-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805458" comment="perf-5.14.0-162.22.2.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805459" comment="python3-perf-5.14.0-162.22.2.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3780" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-28154" ref_url="https://www.suse.com/security/cve/CVE-2023-28154/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1591.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1591.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28154/">CVE-2023-28154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28154">CVE-2023-28154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805460" comment="pcs-0.11.3-4.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805461" comment="pcs-snmp-0.11.3-4.el9_1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3781" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1592.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1592.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805462" comment="tigervnc-1.12.0-5.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805463" comment="tigervnc-icons-1.12.0-5.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805464" comment="tigervnc-license-1.12.0-5.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805465" comment="tigervnc-selinux-1.12.0-5.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805466" comment="tigervnc-server-1.12.0-5.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805467" comment="tigervnc-server-minimal-1.12.0-5.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805468" comment="tigervnc-server-module-1.12.0-5.el9_1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3782" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-25690" ref_url="https://www.suse.com/security/cve/CVE-2023-25690/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1670.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1670.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-25690/">CVE-2023-25690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25690">CVE-2023-25690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805469" comment="httpd-2.4.53-7.el9_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805470" comment="httpd-core-2.4.53-7.el9_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805471" comment="httpd-devel-2.4.53-7.el9_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805472" comment="httpd-filesystem-2.4.53-7.el9_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805473" comment="httpd-manual-2.4.53-7.el9_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805474" comment="httpd-tools-2.4.53-7.el9_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805475" comment="mod_http2-1.15.19-3.el9_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805476" comment="mod_ldap-2.4.53-7.el9_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805477" comment="mod_lua-2.4.53-7.el9_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805478" comment="mod_proxy_html-2.4.53-7.el9_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805479" comment="mod_session-2.4.53-7.el9_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805480" comment="mod_ssl-2.4.53-7.el9_1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3783" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1693.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1693.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805481" comment="postgresql-13.10-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805482" comment="postgresql-contrib-13.10-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805483" comment="postgresql-docs-13.10-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805484" comment="postgresql-plperl-13.10-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805485" comment="postgresql-plpython3-13.10-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805486" comment="postgresql-pltcl-13.10-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805487" comment="postgresql-private-devel-13.10-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805488" comment="postgresql-private-libs-13.10-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805489" comment="postgresql-server-13.10-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805490" comment="postgresql-server-devel-13.10-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805491" comment="postgresql-static-13.10-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805492" comment="postgresql-test-13.10-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805493" comment="postgresql-upgrade-13.10-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805494" comment="postgresql-upgrade-devel-13.10-1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3784" version="1" class="patch">
	<metadata>
		<title>security update for haproxy (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0056" ref_url="https://www.suse.com/security/cve/CVE-2023-0056/" source="CVE"/>
		<reference ref_id="CVE-2023-25725" ref_url="https://www.suse.com/security/cve/CVE-2023-25725/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1696.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1696.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0056/">CVE-2023-0056 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0056">CVE-2023-0056 at NVD</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-25725/">CVE-2023-25725 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25725">CVE-2023-25725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805495" comment="haproxy-2.4.17-3.el9_1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3785" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-23916" ref_url="https://www.suse.com/security/cve/CVE-2023-23916/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1701.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1701.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23916/">CVE-2023-23916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23916">CVE-2023-23916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805496" comment="curl-7.76.1-19.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805497" comment="curl-minimal-7.76.1-19.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805498" comment="libcurl-7.76.1-19.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805499" comment="libcurl-devel-7.76.1-19.el9_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805500" comment="libcurl-minimal-7.76.1-19.el9_1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3786" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0386" ref_url="https://www.suse.com/security/cve/CVE-2023-0386/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1703.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1703.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0386/">CVE-2023-0386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0386">CVE-2023-0386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805501" comment="bpftool-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805502" comment="kernel-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805503" comment="kernel-abi-stablelists-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805504" comment="kernel-core-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805505" comment="kernel-cross-headers-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805506" comment="kernel-debug-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805507" comment="kernel-debug-core-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805510" comment="kernel-debug-modules-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805511" comment="kernel-debug-modules-extra-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805514" comment="kernel-doc-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805515" comment="kernel-headers-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805516" comment="kernel-modules-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805517" comment="kernel-modules-extra-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805518" comment="kernel-tools-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805519" comment="kernel-tools-libs-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805521" comment="perf-5.14.0-162.23.1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805522" comment="python3-perf-5.14.0-162.23.1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3787" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-1945" ref_url="https://www.suse.com/security/cve/CVE-2023-1945/" source="CVE"/>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<reference ref_id="CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533/" source="CVE"/>
		<reference ref_id="CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535/" source="CVE"/>
		<reference ref_id="CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536/" source="CVE"/>
		<reference ref_id="CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539/" source="CVE"/>
		<reference ref_id="CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541/" source="CVE"/>
		<reference ref_id="CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548/" source="CVE"/>
		<reference ref_id="CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1786.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1786.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-1945/">CVE-2023-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1945">CVE-2023-1945 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805523" comment="firefox-102.10.0-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805524" comment="firefox-x11-102.10.0-1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3788" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0547" ref_url="https://www.suse.com/security/cve/CVE-2023-0547/" source="CVE"/>
		<reference ref_id="CVE-2023-1945" ref_url="https://www.suse.com/security/cve/CVE-2023-1945/" source="CVE"/>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<reference ref_id="CVE-2023-28427" ref_url="https://www.suse.com/security/cve/CVE-2023-28427/" source="CVE"/>
		<reference ref_id="CVE-2023-29479" ref_url="https://www.suse.com/security/cve/CVE-2023-29479/" source="CVE"/>
		<reference ref_id="CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533/" source="CVE"/>
		<reference ref_id="CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535/" source="CVE"/>
		<reference ref_id="CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536/" source="CVE"/>
		<reference ref_id="CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539/" source="CVE"/>
		<reference ref_id="CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541/" source="CVE"/>
		<reference ref_id="CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548/" source="CVE"/>
		<reference ref_id="CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1809.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1809.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0547/">CVE-2023-0547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0547">CVE-2023-0547 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-1945/">CVE-2023-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1945">CVE-2023-1945 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-28427/">CVE-2023-28427 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28427">CVE-2023-28427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29479/">CVE-2023-29479 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29479">CVE-2023-29479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805525" comment="thunderbird-102.10.0-2.el9_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3789" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1879.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1879.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805526" comment="java-17-openjdk-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805527" comment="java-17-openjdk-demo-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805528" comment="java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805529" comment="java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805530" comment="java-17-openjdk-devel-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805531" comment="java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805532" comment="java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805533" comment="java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805534" comment="java-17-openjdk-headless-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805535" comment="java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805536" comment="java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805537" comment="java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805538" comment="java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805539" comment="java-17-openjdk-jmods-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805540" comment="java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805541" comment="java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805542" comment="java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805543" comment="java-17-openjdk-src-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805544" comment="java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805545" comment="java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805546" comment="java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805547" comment="java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805548" comment="java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3790" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1880.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1880.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805549" comment="java-11-openjdk-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805550" comment="java-11-openjdk-demo-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805551" comment="java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805552" comment="java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805553" comment="java-11-openjdk-devel-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805554" comment="java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805555" comment="java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805556" comment="java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805557" comment="java-11-openjdk-headless-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805558" comment="java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805559" comment="java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805560" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805561" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805562" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805563" comment="java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805564" comment="java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805565" comment="java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805566" comment="java-11-openjdk-src-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805567" comment="java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805568" comment="java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805569" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805570" comment="java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805571" comment="java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3791" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1909.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1909.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805572" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805573" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805574" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805575" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805576" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805577" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805578" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805579" comment="java-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805580" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805581" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805582" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805583" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805584" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805585" comment="java-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805586" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805587" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805588" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3792" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-28205" ref_url="https://www.suse.com/security/cve/CVE-2023-28205/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1918.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1918.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28205/">CVE-2023-28205 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28205">CVE-2023-28205 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805589" comment="webkit2gtk3-2.36.7-1.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805590" comment="webkit2gtk3-devel-2.36.7-1.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805591" comment="webkit2gtk3-jsc-2.36.7-1.el9_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805592" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3793" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-28617" ref_url="https://www.suse.com/security/cve/CVE-2023-28617/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2074.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2074.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28617/">CVE-2023-28617 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28617">CVE-2023-28617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805593" comment="emacs-27.2-6.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805594" comment="emacs-common-27.2-6.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805595" comment="emacs-filesystem-27.2-6.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805596" comment="emacs-lucid-27.2-6.el9_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805597" comment="emacs-nox-27.2-6.el9_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3794" version="1" class="patch">
	<metadata>
		<title>security update for libwebp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2078.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2078.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805598" comment="libwebp-1.2.0-6.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805599" comment="libwebp-devel-1.2.0-6.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3795" version="1" class="patch">
	<metadata>
		<title>security update for samba (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-38023" ref_url="https://www.suse.com/security/cve/CVE-2022-38023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2127.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2127.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38023/">CVE-2022-38023 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38023">CVE-2022-38023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805600" comment="ctdb-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805601" comment="libsmbclient-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805602" comment="libsmbclient-devel-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805603" comment="libwbclient-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805604" comment="libwbclient-devel-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805605" comment="python3-samba-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805606" comment="samba-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805607" comment="samba-client-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805608" comment="samba-client-libs-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805609" comment="samba-common-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805610" comment="samba-common-libs-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805611" comment="samba-common-tools-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805612" comment="samba-devel-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805613" comment="samba-krb5-printing-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805614" comment="samba-libs-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805615" comment="samba-pidl-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805616" comment="samba-test-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805617" comment="samba-test-libs-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805618" comment="samba-vfs-iouring-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805619" comment="samba-winbind-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805620" comment="samba-winbind-clients-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805621" comment="samba-winbind-krb5-locator-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805622" comment="samba-winbind-modules-4.16.4-103.el9_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805623" comment="samba-winexe-4.16.4-103.el9_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3796" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-36087" ref_url="https://www.suse.com/security/cve/CVE-2022-36087/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2161.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2161.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36087/">CVE-2022-36087 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36087">CVE-2022-36087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805624" comment="fence-agents-aliyun-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805625" comment="fence-agents-all-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805626" comment="fence-agents-amt-ws-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805627" comment="fence-agents-apc-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805628" comment="fence-agents-apc-snmp-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805629" comment="fence-agents-aws-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805630" comment="fence-agents-azure-arm-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805631" comment="fence-agents-bladecenter-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805632" comment="fence-agents-brocade-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805633" comment="fence-agents-cisco-mds-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805634" comment="fence-agents-cisco-ucs-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805635" comment="fence-agents-common-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805636" comment="fence-agents-compute-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805637" comment="fence-agents-drac5-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805638" comment="fence-agents-eaton-snmp-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805639" comment="fence-agents-emerson-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805640" comment="fence-agents-eps-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805641" comment="fence-agents-gce-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805642" comment="fence-agents-heuristics-ping-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805643" comment="fence-agents-hpblade-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805644" comment="fence-agents-ibm-powervs-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805645" comment="fence-agents-ibm-vpc-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805646" comment="fence-agents-ibmblade-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805647" comment="fence-agents-ifmib-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805648" comment="fence-agents-ilo-moonshot-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805649" comment="fence-agents-ilo-mp-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805650" comment="fence-agents-ilo-ssh-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805651" comment="fence-agents-ilo2-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805652" comment="fence-agents-intelmodular-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805653" comment="fence-agents-ipdu-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805654" comment="fence-agents-ipmilan-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805655" comment="fence-agents-kdump-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805656" comment="fence-agents-kubevirt-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805657" comment="fence-agents-mpath-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805658" comment="fence-agents-openstack-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805659" comment="fence-agents-redfish-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805660" comment="fence-agents-rhevm-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805661" comment="fence-agents-rsa-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805662" comment="fence-agents-rsb-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805663" comment="fence-agents-sbd-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805664" comment="fence-agents-scsi-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805665" comment="fence-agents-virsh-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805666" comment="fence-agents-vmware-rest-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805667" comment="fence-agents-vmware-soap-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805668" comment="fence-agents-wti-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805669" comment="fence-virt-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805670" comment="fence-virtd-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805671" comment="fence-virtd-cpg-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805672" comment="fence-virtd-libvirt-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805673" comment="fence-virtd-multicast-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805674" comment="fence-virtd-serial-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805675" comment="fence-virtd-tcp-4.10.0-43.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805676" comment="ha-cloud-support-4.10.0-43.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3797" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3165" ref_url="https://www.suse.com/security/cve/CVE-2022-3165/" source="CVE"/>
		<reference ref_id="CVE-2022-4172" ref_url="https://www.suse.com/security/cve/CVE-2022-4172/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2162.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2162.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3165/">CVE-2022-3165 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3165">CVE-2022-3165 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4172/">CVE-2022-4172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4172">CVE-2022-4172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805677" comment="qemu-guest-agent-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805678" comment="qemu-img-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805679" comment="qemu-kvm-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805680" comment="qemu-kvm-audio-pa-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805681" comment="qemu-kvm-block-curl-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805682" comment="qemu-kvm-block-rbd-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805683" comment="qemu-kvm-common-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805684" comment="qemu-kvm-core-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805685" comment="qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805686" comment="qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805687" comment="qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805688" comment="qemu-kvm-device-usb-host-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805689" comment="qemu-kvm-device-usb-redirect-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805690" comment="qemu-kvm-docs-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805691" comment="qemu-kvm-tools-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805692" comment="qemu-kvm-ui-egl-headless-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805693" comment="qemu-kvm-ui-opengl-7.2.0-14.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805694" comment="qemu-pr-helper-7.2.0-14.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3798" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-38578" ref_url="https://www.suse.com/security/cve/CVE-2021-38578/" source="CVE"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="CVE-2022-4450" ref_url="https://www.suse.com/security/cve/CVE-2022-4450/" source="CVE"/>
		<reference ref_id="CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2165.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2165.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-38578/">CVE-2021-38578 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38578">CVE-2021-38578 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4450/">CVE-2022-4450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4450">CVE-2022-4450 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805695" comment="edk2-ovmf-20221207gitfff6d81270b5-9.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805696" comment="edk2-tools-20221207gitfff6d81270b5-9.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805697" comment="edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3799" version="1" class="patch">
	<metadata>
		<title>security update for freeradius (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41859" ref_url="https://www.suse.com/security/cve/CVE-2022-41859/" source="CVE"/>
		<reference ref_id="CVE-2022-41860" ref_url="https://www.suse.com/security/cve/CVE-2022-41860/" source="CVE"/>
		<reference ref_id="CVE-2022-41861" ref_url="https://www.suse.com/security/cve/CVE-2022-41861/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2166.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2166.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41859/">CVE-2022-41859 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41859">CVE-2022-41859 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41860/">CVE-2022-41860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41860">CVE-2022-41860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41861/">CVE-2022-41861 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41861">CVE-2022-41861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805698" comment="freeradius-3.0.21-37.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805699" comment="freeradius-devel-3.0.21-37.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805700" comment="freeradius-doc-3.0.21-37.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805701" comment="freeradius-krb5-3.0.21-37.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805702" comment="freeradius-ldap-3.0.21-37.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805703" comment="freeradius-mysql-3.0.21-37.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805704" comment="freeradius-perl-3.0.21-37.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805705" comment="freeradius-postgresql-3.0.21-37.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805706" comment="freeradius-rest-3.0.21-37.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805707" comment="freeradius-sqlite-3.0.21-37.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805708" comment="freeradius-unixODBC-3.0.21-37.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805709" comment="freeradius-utils-3.0.21-37.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805710" comment="python3-freeradius-3.0.21-37.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3800" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-35957" ref_url="https://www.suse.com/security/cve/CVE-2022-35957/" source="CVE"/>
		<reference ref_id="CVE-2022-39229" ref_url="https://www.suse.com/security/cve/CVE-2022-39229/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2167.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2167.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-35957/">CVE-2022-35957 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35957">CVE-2022-35957 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39229/">CVE-2022-39229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39229">CVE-2022-39229 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805711" comment="grafana-9.0.9-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3801" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2177.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2177.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805712" comment="grafana-pcp-5.1.1-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3802" version="1" class="patch">
	<metadata>
		<title>security update for libguestfs-winsupport (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-46790" ref_url="https://www.suse.com/security/cve/CVE-2021-46790/" source="CVE"/>
		<reference ref_id="CVE-2022-30784" ref_url="https://www.suse.com/security/cve/CVE-2022-30784/" source="CVE"/>
		<reference ref_id="CVE-2022-30786" ref_url="https://www.suse.com/security/cve/CVE-2022-30786/" source="CVE"/>
		<reference ref_id="CVE-2022-30788" ref_url="https://www.suse.com/security/cve/CVE-2022-30788/" source="CVE"/>
		<reference ref_id="CVE-2022-30789" ref_url="https://www.suse.com/security/cve/CVE-2022-30789/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2179.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2179.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-46790/">CVE-2021-46790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46790">CVE-2021-46790 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30784/">CVE-2022-30784 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30784">CVE-2022-30784 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30786/">CVE-2022-30786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30786">CVE-2022-30786 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30788/">CVE-2022-30788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30788">CVE-2022-30788 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30789/">CVE-2022-30789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30789">CVE-2022-30789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805713" comment="libguestfs-winsupport-9.2-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3803" version="1" class="patch">
	<metadata>
		<title>security update for butane (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2193.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2193.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805714" comment="butane-0.16.0-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3804" version="1" class="patch">
	<metadata>
		<title>security update for frr (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-37032" ref_url="https://www.suse.com/security/cve/CVE-2022-37032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2202.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2202.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37032/">CVE-2022-37032 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37032">CVE-2022-37032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805715" comment="frr-8.3.1-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805716" comment="frr-selinux-8.3.1-5.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3805" version="1" class="patch">
	<metadata>
		<title>security update for gdk-pixbuf2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-44648" ref_url="https://www.suse.com/security/cve/CVE-2021-44648/" source="CVE"/>
		<reference ref_id="CVE-2021-46829" ref_url="https://www.suse.com/security/cve/CVE-2021-46829/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2216.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2216.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44648/">CVE-2021-44648 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44648">CVE-2021-44648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46829/">CVE-2021-46829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46829">CVE-2021-46829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805717" comment="gdk-pixbuf2-2.42.6-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805718" comment="gdk-pixbuf2-devel-2.42.6-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805719" comment="gdk-pixbuf2-modules-2.42.6-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3806" version="1" class="patch">
	<metadata>
		<title>security update for conmon (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2222.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2222.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805720" comment="conmon-2.1.7-1.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3807" version="1" class="patch">
	<metadata>
		<title>security update for sysstat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-39377" ref_url="https://www.suse.com/security/cve/CVE-2022-39377/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2234.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2234.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39377/">CVE-2022-39377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39377">CVE-2022-39377 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805721" comment="sysstat-12.5.4-5.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3808" version="1" class="patch">
	<metadata>
		<title>security update for toolbox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2236.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2236.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805722" comment="toolbox-0.0.99.3-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805723" comment="toolbox-tests-0.0.99.3-9.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3809" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550/" source="CVE"/>
		<reference ref_id="CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551/" source="CVE"/>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<reference ref_id="CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2248.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2248.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3550">CVE-2022-3550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3551">CVE-2022-3551 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805724" comment="xorg-x11-server-Xdmx-1.20.11-17.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805725" comment="xorg-x11-server-Xephyr-1.20.11-17.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805726" comment="xorg-x11-server-Xnest-1.20.11-17.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805727" comment="xorg-x11-server-Xorg-1.20.11-17.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805728" comment="xorg-x11-server-Xvfb-1.20.11-17.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805729" comment="xorg-x11-server-common-1.20.11-17.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805730" comment="xorg-x11-server-devel-1.20.11-17.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805731" comment="xorg-x11-server-source-1.20.11-17.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3810" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server-Xwayland (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550/" source="CVE"/>
		<reference ref_id="CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551/" source="CVE"/>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<reference ref_id="CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2249.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2249.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3550">CVE-2022-3550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3551">CVE-2022-3551 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805732" comment="xorg-x11-server-Xwayland-21.1.3-7.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3811" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-30629" ref_url="https://www.suse.com/security/cve/CVE-2022-30629/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2253.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2253.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30629/">CVE-2022-30629 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30629">CVE-2022-30629 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805733" comment="buildah-1.29.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805734" comment="buildah-tests-1.29.1-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3812" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-32886" ref_url="https://www.suse.com/security/cve/CVE-2022-32886/" source="CVE"/>
		<reference ref_id="CVE-2022-32888" ref_url="https://www.suse.com/security/cve/CVE-2022-32888/" source="CVE"/>
		<reference ref_id="CVE-2022-32923" ref_url="https://www.suse.com/security/cve/CVE-2022-32923/" source="CVE"/>
		<reference ref_id="CVE-2022-42799" ref_url="https://www.suse.com/security/cve/CVE-2022-42799/" source="CVE"/>
		<reference ref_id="CVE-2022-42823" ref_url="https://www.suse.com/security/cve/CVE-2022-42823/" source="CVE"/>
		<reference ref_id="CVE-2022-42824" ref_url="https://www.suse.com/security/cve/CVE-2022-42824/" source="CVE"/>
		<reference ref_id="CVE-2022-42826" ref_url="https://www.suse.com/security/cve/CVE-2022-42826/" source="CVE"/>
		<reference ref_id="CVE-2022-42852" ref_url="https://www.suse.com/security/cve/CVE-2022-42852/" source="CVE"/>
		<reference ref_id="CVE-2022-42863" ref_url="https://www.suse.com/security/cve/CVE-2022-42863/" source="CVE"/>
		<reference ref_id="CVE-2022-42867" ref_url="https://www.suse.com/security/cve/CVE-2022-42867/" source="CVE"/>
		<reference ref_id="CVE-2022-46691" ref_url="https://www.suse.com/security/cve/CVE-2022-46691/" source="CVE"/>
		<reference ref_id="CVE-2022-46692" ref_url="https://www.suse.com/security/cve/CVE-2022-46692/" source="CVE"/>
		<reference ref_id="CVE-2022-46698" ref_url="https://www.suse.com/security/cve/CVE-2022-46698/" source="CVE"/>
		<reference ref_id="CVE-2022-46699" ref_url="https://www.suse.com/security/cve/CVE-2022-46699/" source="CVE"/>
		<reference ref_id="CVE-2022-46700" ref_url="https://www.suse.com/security/cve/CVE-2022-46700/" source="CVE"/>
		<reference ref_id="CVE-2022-48503" ref_url="https://www.suse.com/security/cve/CVE-2022-48503/" source="CVE"/>
		<reference ref_id="CVE-2023-23517" ref_url="https://www.suse.com/security/cve/CVE-2023-23517/" source="CVE"/>
		<reference ref_id="CVE-2023-23518" ref_url="https://www.suse.com/security/cve/CVE-2023-23518/" source="CVE"/>
		<reference ref_id="CVE-2023-25358" ref_url="https://www.suse.com/security/cve/CVE-2023-25358/" source="CVE"/>
		<reference ref_id="CVE-2023-25360" ref_url="https://www.suse.com/security/cve/CVE-2023-25360/" source="CVE"/>
		<reference ref_id="CVE-2023-25361" ref_url="https://www.suse.com/security/cve/CVE-2023-25361/" source="CVE"/>
		<reference ref_id="CVE-2023-25362" ref_url="https://www.suse.com/security/cve/CVE-2023-25362/" source="CVE"/>
		<reference ref_id="CVE-2023-25363" ref_url="https://www.suse.com/security/cve/CVE-2023-25363/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2256.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2256.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32886/">CVE-2022-32886 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32886">CVE-2022-32886 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32888/">CVE-2022-32888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32888">CVE-2022-32888 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32923/">CVE-2022-32923 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32923">CVE-2022-32923 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42799/">CVE-2022-42799 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42799">CVE-2022-42799 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42823/">CVE-2022-42823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42823">CVE-2022-42823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42824/">CVE-2022-42824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42824">CVE-2022-42824 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42826/">CVE-2022-42826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42826">CVE-2022-42826 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42852/">CVE-2022-42852 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42852">CVE-2022-42852 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42863/">CVE-2022-42863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42863">CVE-2022-42863 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42867/">CVE-2022-42867 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42867">CVE-2022-42867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46691/">CVE-2022-46691 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46691">CVE-2022-46691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46692/">CVE-2022-46692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46692">CVE-2022-46692 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-46698/">CVE-2022-46698 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46698">CVE-2022-46698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46699/">CVE-2022-46699 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46699">CVE-2022-46699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46700/">CVE-2022-46700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46700">CVE-2022-46700 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48503/">CVE-2022-48503 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48503">CVE-2022-48503 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23517/">CVE-2023-23517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23517">CVE-2023-23517 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23518/">CVE-2023-23518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23518">CVE-2023-23518 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25358/">CVE-2023-25358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25358">CVE-2023-25358 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25360/">CVE-2023-25360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25360">CVE-2023-25360 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25361/">CVE-2023-25361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25361">CVE-2023-25361 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25362/">CVE-2023-25362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25362">CVE-2023-25362 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25363/">CVE-2023-25363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25363">CVE-2023-25363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3813" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2257.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2257.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805739" comment="tigervnc-1.12.0-13.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805740" comment="tigervnc-icons-1.12.0-13.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805741" comment="tigervnc-license-1.12.0-13.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805742" comment="tigervnc-selinux-1.12.0-13.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805743" comment="tigervnc-server-1.12.0-13.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805744" comment="tigervnc-server-minimal-1.12.0-13.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805745" comment="tigervnc-server-module-1.12.0-13.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3814" version="1" class="patch">
	<metadata>
		<title>security update for python-mako (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-40023" ref_url="https://www.suse.com/security/cve/CVE-2022-40023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2258.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2258.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40023/">CVE-2022-40023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40023">CVE-2022-40023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805746" comment="python3-mako-1.1.4-6.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3815" version="1" class="patch">
	<metadata>
		<title>security update for poppler (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-38784" ref_url="https://www.suse.com/security/cve/CVE-2022-38784/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2259.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2259.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38784/">CVE-2022-38784 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38784">CVE-2022-38784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805747" comment="poppler-21.01.0-14.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805748" comment="poppler-cpp-21.01.0-14.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805749" comment="poppler-cpp-devel-21.01.0-14.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805750" comment="poppler-devel-21.01.0-14.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805751" comment="poppler-glib-21.01.0-14.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805752" comment="poppler-glib-devel-21.01.0-14.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805753" comment="poppler-qt5-21.01.0-14.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805754" comment="poppler-qt5-devel-21.01.0-14.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805755" comment="poppler-utils-21.01.0-14.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3816" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-good (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1920" ref_url="https://www.suse.com/security/cve/CVE-2022-1920/" source="CVE"/>
		<reference ref_id="CVE-2022-1921" ref_url="https://www.suse.com/security/cve/CVE-2022-1921/" source="CVE"/>
		<reference ref_id="CVE-2022-1922" ref_url="https://www.suse.com/security/cve/CVE-2022-1922/" source="CVE"/>
		<reference ref_id="CVE-2022-1923" ref_url="https://www.suse.com/security/cve/CVE-2022-1923/" source="CVE"/>
		<reference ref_id="CVE-2022-1924" ref_url="https://www.suse.com/security/cve/CVE-2022-1924/" source="CVE"/>
		<reference ref_id="CVE-2022-1925" ref_url="https://www.suse.com/security/cve/CVE-2022-1925/" source="CVE"/>
		<reference ref_id="CVE-2022-2122" ref_url="https://www.suse.com/security/cve/CVE-2022-2122/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2260.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2260.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1920/">CVE-2022-1920 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1920">CVE-2022-1920 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1921/">CVE-2022-1921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1921">CVE-2022-1921 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1922/">CVE-2022-1922 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1922">CVE-2022-1922 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1923/">CVE-2022-1923 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1923">CVE-2022-1923 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1924/">CVE-2022-1924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1924">CVE-2022-1924 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1925/">CVE-2022-1925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1925">CVE-2022-1925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2122/">CVE-2022-2122 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2122">CVE-2022-2122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805756" comment="gstreamer1-plugins-good-1.18.4-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805757" comment="gstreamer1-plugins-good-gtk-1.18.4-6.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3817" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2795" ref_url="https://www.suse.com/security/cve/CVE-2022-2795/" source="CVE"/>
		<reference ref_id="CVE-2022-3094" ref_url="https://www.suse.com/security/cve/CVE-2022-3094/" source="CVE"/>
		<reference ref_id="CVE-2022-3736" ref_url="https://www.suse.com/security/cve/CVE-2022-3736/" source="CVE"/>
		<reference ref_id="CVE-2022-3924" ref_url="https://www.suse.com/security/cve/CVE-2022-3924/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2261.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2261.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2795/">CVE-2022-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3094/">CVE-2022-3094 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3094">CVE-2022-3094 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3736/">CVE-2022-3736 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3736">CVE-2022-3736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3924/">CVE-2022-3924 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3924">CVE-2022-3924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805758" comment="bind-9.16.23-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805759" comment="bind-chroot-9.16.23-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805760" comment="bind-devel-9.16.23-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805761" comment="bind-dnssec-doc-9.16.23-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805762" comment="bind-dnssec-utils-9.16.23-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805763" comment="bind-doc-9.16.23-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805764" comment="bind-libs-9.16.23-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805765" comment="bind-license-9.16.23-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805766" comment="bind-utils-9.16.23-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805767" comment="python3-bind-9.16.23-11.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3818" version="1" class="patch">
	<metadata>
		<title>security update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-30629" ref_url="https://www.suse.com/security/cve/CVE-2022-30629/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2282.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2282.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30629/">CVE-2022-30629 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30629">CVE-2022-30629 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805768" comment="podman-4.4.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805769" comment="podman-docker-4.4.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805770" comment="podman-gvproxy-4.4.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805771" comment="podman-plugins-4.4.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805772" comment="podman-remote-4.4.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805773" comment="podman-tests-4.4.1-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3819" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-30629" ref_url="https://www.suse.com/security/cve/CVE-2022-30629/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2283.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2283.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30629/">CVE-2022-30629 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30629">CVE-2022-30629 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805774" comment="skopeo-1.11.2-0.1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805775" comment="skopeo-tests-1.11.2-0.1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3820" version="1" class="patch">
	<metadata>
		<title>security update for jss (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2393" ref_url="https://www.suse.com/security/cve/CVE-2022-2393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2293.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2293.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2393/">CVE-2022-2393 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2393">CVE-2022-2393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805776" comment="idm-jss-5.3.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805777" comment="idm-ldapjdk-5.3.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805778" comment="idm-pki-acme-11.3.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805779" comment="idm-pki-base-11.3.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805780" comment="idm-pki-ca-11.3.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805781" comment="idm-pki-est-11.3.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805782" comment="idm-pki-java-11.3.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805783" comment="idm-pki-kra-11.3.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805784" comment="idm-pki-server-11.3.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805785" comment="idm-pki-tools-11.3.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805786" comment="idm-tomcatjss-8.3.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805787" comment="python3-idm-pki-11.3.0-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3821" version="1" class="patch">
	<metadata>
		<title>security update for jackson-annotations (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2312.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2312.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36518">CVE-2020-36518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805788" comment="pki-jackson-annotations-2.14.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805789" comment="pki-jackson-core-2.14.1-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805790" comment="pki-jackson-databind-2.14.1-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805791" comment="pki-jackson-jaxrs-json-provider-2.14.1-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805792" comment="pki-jackson-jaxrs-providers-2.14.1-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805793" comment="pki-jackson-module-jaxb-annotations-2.14.1-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3822" version="1" class="patch">
	<metadata>
		<title>security update for git (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="CVE-2022-29187" ref_url="https://www.suse.com/security/cve/CVE-2022-29187/" source="CVE"/>
		<reference ref_id="CVE-2022-39253" ref_url="https://www.suse.com/security/cve/CVE-2022-39253/" source="CVE"/>
		<reference ref_id="CVE-2022-39260" ref_url="https://www.suse.com/security/cve/CVE-2022-39260/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2319.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2319.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29187/">CVE-2022-29187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29187">CVE-2022-29187 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39253/">CVE-2022-39253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39253">CVE-2022-39253 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39260/">CVE-2022-39260 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39260">CVE-2022-39260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805794" comment="git-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805795" comment="git-all-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805796" comment="git-core-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805797" comment="git-core-doc-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805798" comment="git-credential-libsecret-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805799" comment="git-daemon-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805800" comment="git-email-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805801" comment="git-gui-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805802" comment="git-instaweb-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805803" comment="git-subtree-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805804" comment="git-svn-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805805" comment="gitk-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805806" comment="gitweb-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805807" comment="perl-Git-2.39.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805808" comment="perl-Git-SVN-2.39.1-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3823" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-39282" ref_url="https://www.suse.com/security/cve/CVE-2022-39282/" source="CVE"/>
		<reference ref_id="CVE-2022-39283" ref_url="https://www.suse.com/security/cve/CVE-2022-39283/" source="CVE"/>
		<reference ref_id="CVE-2022-39316" ref_url="https://www.suse.com/security/cve/CVE-2022-39316/" source="CVE"/>
		<reference ref_id="CVE-2022-39317" ref_url="https://www.suse.com/security/cve/CVE-2022-39317/" source="CVE"/>
		<reference ref_id="CVE-2022-39318" ref_url="https://www.suse.com/security/cve/CVE-2022-39318/" source="CVE"/>
		<reference ref_id="CVE-2022-39319" ref_url="https://www.suse.com/security/cve/CVE-2022-39319/" source="CVE"/>
		<reference ref_id="CVE-2022-39320" ref_url="https://www.suse.com/security/cve/CVE-2022-39320/" source="CVE"/>
		<reference ref_id="CVE-2022-39347" ref_url="https://www.suse.com/security/cve/CVE-2022-39347/" source="CVE"/>
		<reference ref_id="CVE-2022-41877" ref_url="https://www.suse.com/security/cve/CVE-2022-41877/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2326.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2326.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39282/">CVE-2022-39282 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39282">CVE-2022-39282 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39283/">CVE-2022-39283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39283">CVE-2022-39283 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39316/">CVE-2022-39316 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39316">CVE-2022-39316 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39317/">CVE-2022-39317 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39317">CVE-2022-39317 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39318/">CVE-2022-39318 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39318">CVE-2022-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39319/">CVE-2022-39319 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39319">CVE-2022-39319 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39320/">CVE-2022-39320 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39320">CVE-2022-39320 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39347/">CVE-2022-39347 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39347">CVE-2022-39347 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41877/">CVE-2022-41877 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41877">CVE-2022-41877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805809" comment="freerdp-2.4.1-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805810" comment="freerdp-devel-2.4.1-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805811" comment="freerdp-libs-2.4.1-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805812" comment="libwinpr-2.4.1-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805813" comment="libwinpr-devel-2.4.1-5.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3824" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3570" ref_url="https://www.suse.com/security/cve/CVE-2022-3570/" source="CVE"/>
		<reference ref_id="CVE-2022-3597" ref_url="https://www.suse.com/security/cve/CVE-2022-3597/" source="CVE"/>
		<reference ref_id="CVE-2022-3598" ref_url="https://www.suse.com/security/cve/CVE-2022-3598/" source="CVE"/>
		<reference ref_id="CVE-2022-3599" ref_url="https://www.suse.com/security/cve/CVE-2022-3599/" source="CVE"/>
		<reference ref_id="CVE-2022-3626" ref_url="https://www.suse.com/security/cve/CVE-2022-3626/" source="CVE"/>
		<reference ref_id="CVE-2022-3627" ref_url="https://www.suse.com/security/cve/CVE-2022-3627/" source="CVE"/>
		<reference ref_id="CVE-2022-3970" ref_url="https://www.suse.com/security/cve/CVE-2022-3970/" source="CVE"/>
		<reference ref_id="CVE-2022-4645" ref_url="https://www.suse.com/security/cve/CVE-2022-4645/" source="CVE"/>
		<reference ref_id="CVE-2023-30086" ref_url="https://www.suse.com/security/cve/CVE-2023-30086/" source="CVE"/>
		<reference ref_id="CVE-2023-30774" ref_url="https://www.suse.com/security/cve/CVE-2023-30774/" source="CVE"/>
		<reference ref_id="CVE-2023-30775" ref_url="https://www.suse.com/security/cve/CVE-2023-30775/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2340.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2340.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3570/">CVE-2022-3570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3570">CVE-2022-3570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3597/">CVE-2022-3597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3597">CVE-2022-3597 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3598/">CVE-2022-3598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3598">CVE-2022-3598 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3599/">CVE-2022-3599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3599">CVE-2022-3599 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3626/">CVE-2022-3626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3626">CVE-2022-3626 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3627/">CVE-2022-3627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3627">CVE-2022-3627 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3970/">CVE-2022-3970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3970">CVE-2022-3970 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4645/">CVE-2022-4645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4645">CVE-2022-4645 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30086/">CVE-2023-30086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30086">CVE-2023-30086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30774/">CVE-2023-30774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30774">CVE-2023-30774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30775/">CVE-2023-30775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30775">CVE-2023-30775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805814" comment="libtiff-4.4.0-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805815" comment="libtiff-devel-4.4.0-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805816" comment="libtiff-tools-4.4.0-7.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3825" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<reference ref_id="CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2357.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2357.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805817" comment="git-lfs-3.2.0-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3826" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-45939" ref_url="https://www.suse.com/security/cve/CVE-2022-45939/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2366.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2366.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45939/">CVE-2022-45939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45939">CVE-2022-45939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805818" comment="emacs-27.2-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805819" comment="emacs-common-27.2-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805820" comment="emacs-filesystem-27.2-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805821" comment="emacs-lucid-27.2-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805822" comment="emacs-nox-27.2-8.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3827" version="1" class="patch">
	<metadata>
		<title>security update for containernetworking-plugins (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-30629" ref_url="https://www.suse.com/security/cve/CVE-2022-30629/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2367.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2367.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30629/">CVE-2022-30629 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30629">CVE-2022-30629 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805823" comment="containernetworking-plugins-1.2.0-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3828" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3204" ref_url="https://www.suse.com/security/cve/CVE-2022-3204/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2370.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2370.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3204/">CVE-2022-3204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3204">CVE-2022-3204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805824" comment="python3-unbound-1.16.2-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805825" comment="unbound-1.16.2-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805826" comment="unbound-devel-1.16.2-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805827" comment="unbound-libs-1.16.2-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3829" version="1" class="patch">
	<metadata>
		<title>security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3190" ref_url="https://www.suse.com/security/cve/CVE-2022-3190/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2373.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2373.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3190/">CVE-2022-3190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3190">CVE-2022-3190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805828" comment="wireshark-3.4.10-4.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805829" comment="wireshark-cli-3.4.10-4.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805830" comment="wireshark-devel-3.4.10-4.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3830" version="1" class="patch">
	<metadata>
		<title>security update for postgresql-jdbc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41946" ref_url="https://www.suse.com/security/cve/CVE-2022-41946/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2378.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2378.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41946/">CVE-2022-41946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41946">CVE-2022-41946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805831" comment="postgresql-jdbc-42.2.27-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3831" version="1" class="patch">
	<metadata>
		<title>security update for php (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-31628" ref_url="https://www.suse.com/security/cve/CVE-2022-31628/" source="CVE"/>
		<reference ref_id="CVE-2022-31629" ref_url="https://www.suse.com/security/cve/CVE-2022-31629/" source="CVE"/>
		<reference ref_id="CVE-2022-31630" ref_url="https://www.suse.com/security/cve/CVE-2022-31630/" source="CVE"/>
		<reference ref_id="CVE-2022-31631" ref_url="https://www.suse.com/security/cve/CVE-2022-31631/" source="CVE"/>
		<reference ref_id="CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2417.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2417.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31628/">CVE-2022-31628 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31628">CVE-2022-31628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31629/">CVE-2022-31629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31629">CVE-2022-31629 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31630/">CVE-2022-31630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31630">CVE-2022-31630 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31631/">CVE-2022-31631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-31631">CVE-2022-31631 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805833" comment="php-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805834" comment="php-bcmath-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805835" comment="php-cli-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805836" comment="php-common-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805837" comment="php-dba-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805838" comment="php-dbg-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805839" comment="php-devel-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805840" comment="php-embedded-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805841" comment="php-enchant-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805842" comment="php-ffi-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805843" comment="php-fpm-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805844" comment="php-gd-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805845" comment="php-gmp-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805846" comment="php-intl-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805847" comment="php-ldap-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805848" comment="php-mbstring-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805849" comment="php-mysqlnd-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805850" comment="php-odbc-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805851" comment="php-opcache-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805852" comment="php-pdo-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805858" comment="php-pgsql-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805859" comment="php-process-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805860" comment="php-snmp-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805861" comment="php-soap-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805862" comment="php-xml-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3832" version="1" class="patch">
	<metadata>
		<title>security update for net-snmp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-44792" ref_url="https://www.suse.com/security/cve/CVE-2022-44792/" source="CVE"/>
		<reference ref_id="CVE-2022-44793" ref_url="https://www.suse.com/security/cve/CVE-2022-44793/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2444.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2444.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44792/">CVE-2022-44792 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44792">CVE-2022-44792 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44793/">CVE-2022-44793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44793">CVE-2022-44793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805863" comment="net-snmp-5.9.1-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805864" comment="net-snmp-agent-libs-5.9.1-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805865" comment="net-snmp-devel-5.9.1-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805866" comment="net-snmp-libs-5.9.1-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805867" comment="net-snmp-perl-5.9.1-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805868" comment="net-snmp-utils-5.9.1-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805869" comment="python3-net-snmp-5.9.1-9.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3833" version="1" class="patch">
	<metadata>
		<title>security update for libtpms (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-1017" ref_url="https://www.suse.com/security/cve/CVE-2023-1017/" source="CVE"/>
		<reference ref_id="CVE-2023-1018" ref_url="https://www.suse.com/security/cve/CVE-2023-1018/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2453.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2453.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1017/">CVE-2023-1017 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1017">CVE-2023-1017 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1018/">CVE-2023-1018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1018">CVE-2023-1018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805870" comment="libtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3834" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-26341" ref_url="https://www.suse.com/security/cve/CVE-2021-26341/" source="CVE"/>
		<reference ref_id="CVE-2021-33631" ref_url="https://www.suse.com/security/cve/CVE-2021-33631/" source="CVE"/>
		<reference ref_id="CVE-2021-33655" ref_url="https://www.suse.com/security/cve/CVE-2021-33655/" source="CVE"/>
		<reference ref_id="CVE-2021-47393" ref_url="https://www.suse.com/security/cve/CVE-2021-47393/" source="CVE"/>
		<reference ref_id="CVE-2021-47441" ref_url="https://www.suse.com/security/cve/CVE-2021-47441/" source="CVE"/>
		<reference ref_id="CVE-2021-47560" ref_url="https://www.suse.com/security/cve/CVE-2021-47560/" source="CVE"/>
		<reference ref_id="CVE-2021-47592" ref_url="https://www.suse.com/security/cve/CVE-2021-47592/" source="CVE"/>
		<reference ref_id="CVE-2021-47671" ref_url="https://www.suse.com/security/cve/CVE-2021-47671/" source="CVE"/>
		<reference ref_id="CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462/" source="CVE"/>
		<reference ref_id="CVE-2022-1789" ref_url="https://www.suse.com/security/cve/CVE-2022-1789/" source="CVE"/>
		<reference ref_id="CVE-2022-1882" ref_url="https://www.suse.com/security/cve/CVE-2022-1882/" source="CVE"/>
		<reference ref_id="CVE-2022-20141" ref_url="https://www.suse.com/security/cve/CVE-2022-20141/" source="CVE"/>
		<reference ref_id="CVE-2022-21505" ref_url="https://www.suse.com/security/cve/CVE-2022-21505/" source="CVE"/>
		<reference ref_id="CVE-2022-2196" ref_url="https://www.suse.com/security/cve/CVE-2022-2196/" source="CVE"/>
		<reference ref_id="CVE-2022-2663" ref_url="https://www.suse.com/security/cve/CVE-2022-2663/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-3028" ref_url="https://www.suse.com/security/cve/CVE-2022-3028/" source="CVE"/>
		<reference ref_id="CVE-2022-33743" ref_url="https://www.suse.com/security/cve/CVE-2022-33743/" source="CVE"/>
		<reference ref_id="CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435/" source="CVE"/>
		<reference ref_id="CVE-2022-3522" ref_url="https://www.suse.com/security/cve/CVE-2022-3522/" source="CVE"/>
		<reference ref_id="CVE-2022-3524" ref_url="https://www.suse.com/security/cve/CVE-2022-3524/" source="CVE"/>
		<reference ref_id="CVE-2022-3566" ref_url="https://www.suse.com/security/cve/CVE-2022-3566/" source="CVE"/>
		<reference ref_id="CVE-2022-3567" ref_url="https://www.suse.com/security/cve/CVE-2022-3567/" source="CVE"/>
		<reference ref_id="CVE-2022-3619" ref_url="https://www.suse.com/security/cve/CVE-2022-3619/" source="CVE"/>
		<reference ref_id="CVE-2022-3623" ref_url="https://www.suse.com/security/cve/CVE-2022-3623/" source="CVE"/>
		<reference ref_id="CVE-2022-3625" ref_url="https://www.suse.com/security/cve/CVE-2022-3625/" source="CVE"/>
		<reference ref_id="CVE-2022-3628" ref_url="https://www.suse.com/security/cve/CVE-2022-3628/" source="CVE"/>
		<reference ref_id="CVE-2022-36280" ref_url="https://www.suse.com/security/cve/CVE-2022-36280/" source="CVE"/>
		<reference ref_id="CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640/" source="CVE"/>
		<reference ref_id="CVE-2022-36879" ref_url="https://www.suse.com/security/cve/CVE-2022-36879/" source="CVE"/>
		<reference ref_id="CVE-2022-3707" ref_url="https://www.suse.com/security/cve/CVE-2022-3707/" source="CVE"/>
		<reference ref_id="CVE-2022-39188" ref_url="https://www.suse.com/security/cve/CVE-2022-39188/" source="CVE"/>
		<reference ref_id="CVE-2022-39189" ref_url="https://www.suse.com/security/cve/CVE-2022-39189/" source="CVE"/>
		<reference ref_id="CVE-2022-4128" ref_url="https://www.suse.com/security/cve/CVE-2022-4128/" source="CVE"/>
		<reference ref_id="CVE-2022-4129" ref_url="https://www.suse.com/security/cve/CVE-2022-4129/" source="CVE"/>
		<reference ref_id="CVE-2022-41674" ref_url="https://www.suse.com/security/cve/CVE-2022-41674/" source="CVE"/>
		<reference ref_id="CVE-2022-42703" ref_url="https://www.suse.com/security/cve/CVE-2022-42703/" source="CVE"/>
		<reference ref_id="CVE-2022-42720" ref_url="https://www.suse.com/security/cve/CVE-2022-42720/" source="CVE"/>
		<reference ref_id="CVE-2022-42721" ref_url="https://www.suse.com/security/cve/CVE-2022-42721/" source="CVE"/>
		<reference ref_id="CVE-2022-42722" ref_url="https://www.suse.com/security/cve/CVE-2022-42722/" source="CVE"/>
		<reference ref_id="CVE-2022-42896" ref_url="https://www.suse.com/security/cve/CVE-2022-42896/" source="CVE"/>
		<reference ref_id="CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750/" source="CVE"/>
		<reference ref_id="CVE-2022-4662" ref_url="https://www.suse.com/security/cve/CVE-2022-4662/" source="CVE"/>
		<reference ref_id="CVE-2022-47929" ref_url="https://www.suse.com/security/cve/CVE-2022-47929/" source="CVE"/>
		<reference ref_id="CVE-2022-48695" ref_url="https://www.suse.com/security/cve/CVE-2022-48695/" source="CVE"/>
		<reference ref_id="CVE-2022-48696" ref_url="https://www.suse.com/security/cve/CVE-2022-48696/" source="CVE"/>
		<reference ref_id="CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701/" source="CVE"/>
		<reference ref_id="CVE-2022-48883" ref_url="https://www.suse.com/security/cve/CVE-2022-48883/" source="CVE"/>
		<reference ref_id="CVE-2022-48884" ref_url="https://www.suse.com/security/cve/CVE-2022-48884/" source="CVE"/>
		<reference ref_id="CVE-2022-48885" ref_url="https://www.suse.com/security/cve/CVE-2022-48885/" source="CVE"/>
		<reference ref_id="CVE-2022-48915" ref_url="https://www.suse.com/security/cve/CVE-2022-48915/" source="CVE"/>
		<reference ref_id="CVE-2022-48934" ref_url="https://www.suse.com/security/cve/CVE-2022-48934/" source="CVE"/>
		<reference ref_id="CVE-2022-48939" ref_url="https://www.suse.com/security/cve/CVE-2022-48939/" source="CVE"/>
		<reference ref_id="CVE-2022-48942" ref_url="https://www.suse.com/security/cve/CVE-2022-48942/" source="CVE"/>
		<reference ref_id="CVE-2022-48974" ref_url="https://www.suse.com/security/cve/CVE-2022-48974/" source="CVE"/>
		<reference ref_id="CVE-2022-48976" ref_url="https://www.suse.com/security/cve/CVE-2022-48976/" source="CVE"/>
		<reference ref_id="CVE-2022-48978" ref_url="https://www.suse.com/security/cve/CVE-2022-48978/" source="CVE"/>
		<reference ref_id="CVE-2022-48992" ref_url="https://www.suse.com/security/cve/CVE-2022-48992/" source="CVE"/>
		<reference ref_id="CVE-2022-49010" ref_url="https://www.suse.com/security/cve/CVE-2022-49010/" source="CVE"/>
		<reference ref_id="CVE-2022-49022" ref_url="https://www.suse.com/security/cve/CVE-2022-49022/" source="CVE"/>
		<reference ref_id="CVE-2022-49049" ref_url="https://www.suse.com/security/cve/CVE-2022-49049/" source="CVE"/>
		<reference ref_id="CVE-2022-49058" ref_url="https://www.suse.com/security/cve/CVE-2022-49058/" source="CVE"/>
		<reference ref_id="CVE-2022-49070" ref_url="https://www.suse.com/security/cve/CVE-2022-49070/" source="CVE"/>
		<reference ref_id="CVE-2022-49072" ref_url="https://www.suse.com/security/cve/CVE-2022-49072/" source="CVE"/>
		<reference ref_id="CVE-2022-49080" ref_url="https://www.suse.com/security/cve/CVE-2022-49080/" source="CVE"/>
		<reference ref_id="CVE-2022-49081" ref_url="https://www.suse.com/security/cve/CVE-2022-49081/" source="CVE"/>
		<reference ref_id="CVE-2022-49087" ref_url="https://www.suse.com/security/cve/CVE-2022-49087/" source="CVE"/>
		<reference ref_id="CVE-2022-49097" ref_url="https://www.suse.com/security/cve/CVE-2022-49097/" source="CVE"/>
		<reference ref_id="CVE-2022-49111" ref_url="https://www.suse.com/security/cve/CVE-2022-49111/" source="CVE"/>
		<reference ref_id="CVE-2022-49114" ref_url="https://www.suse.com/security/cve/CVE-2022-49114/" source="CVE"/>
		<reference ref_id="CVE-2022-49116" ref_url="https://www.suse.com/security/cve/CVE-2022-49116/" source="CVE"/>
		<reference ref_id="CVE-2022-49136" ref_url="https://www.suse.com/security/cve/CVE-2022-49136/" source="CVE"/>
		<reference ref_id="CVE-2022-49204" ref_url="https://www.suse.com/security/cve/CVE-2022-49204/" source="CVE"/>
		<reference ref_id="CVE-2022-49205" ref_url="https://www.suse.com/security/cve/CVE-2022-49205/" source="CVE"/>
		<reference ref_id="CVE-2022-49207" ref_url="https://www.suse.com/security/cve/CVE-2022-49207/" source="CVE"/>
		<reference ref_id="CVE-2022-49214" ref_url="https://www.suse.com/security/cve/CVE-2022-49214/" source="CVE"/>
		<reference ref_id="CVE-2022-49223" ref_url="https://www.suse.com/security/cve/CVE-2022-49223/" source="CVE"/>
		<reference ref_id="CVE-2022-49236" ref_url="https://www.suse.com/security/cve/CVE-2022-49236/" source="CVE"/>
		<reference ref_id="CVE-2022-49275" ref_url="https://www.suse.com/security/cve/CVE-2022-49275/" source="CVE"/>
		<reference ref_id="CVE-2022-49283" ref_url="https://www.suse.com/security/cve/CVE-2022-49283/" source="CVE"/>
		<reference ref_id="CVE-2022-49294" ref_url="https://www.suse.com/security/cve/CVE-2022-49294/" source="CVE"/>
		<reference ref_id="CVE-2022-49319" ref_url="https://www.suse.com/security/cve/CVE-2022-49319/" source="CVE"/>
		<reference ref_id="CVE-2022-49323" ref_url="https://www.suse.com/security/cve/CVE-2022-49323/" source="CVE"/>
		<reference ref_id="CVE-2022-49328" ref_url="https://www.suse.com/security/cve/CVE-2022-49328/" source="CVE"/>
		<reference ref_id="CVE-2022-49333" ref_url="https://www.suse.com/security/cve/CVE-2022-49333/" source="CVE"/>
		<reference ref_id="CVE-2022-49345" ref_url="https://www.suse.com/security/cve/CVE-2022-49345/" source="CVE"/>
		<reference ref_id="CVE-2022-49356" ref_url="https://www.suse.com/security/cve/CVE-2022-49356/" source="CVE"/>
		<reference ref_id="CVE-2022-49362" ref_url="https://www.suse.com/security/cve/CVE-2022-49362/" source="CVE"/>
		<reference ref_id="CVE-2022-49365" ref_url="https://www.suse.com/security/cve/CVE-2022-49365/" source="CVE"/>
		<reference ref_id="CVE-2022-49371" ref_url="https://www.suse.com/security/cve/CVE-2022-49371/" source="CVE"/>
		<reference ref_id="CVE-2022-49372" ref_url="https://www.suse.com/security/cve/CVE-2022-49372/" source="CVE"/>
		<reference ref_id="CVE-2022-49376" ref_url="https://www.suse.com/security/cve/CVE-2022-49376/" source="CVE"/>
		<reference ref_id="CVE-2022-49379" ref_url="https://www.suse.com/security/cve/CVE-2022-49379/" source="CVE"/>
		<reference ref_id="CVE-2022-49401" ref_url="https://www.suse.com/security/cve/CVE-2022-49401/" source="CVE"/>
		<reference ref_id="CVE-2022-49416" ref_url="https://www.suse.com/security/cve/CVE-2022-49416/" source="CVE"/>
		<reference ref_id="CVE-2022-49429" ref_url="https://www.suse.com/security/cve/CVE-2022-49429/" source="CVE"/>
		<reference ref_id="CVE-2022-49434" ref_url="https://www.suse.com/security/cve/CVE-2022-49434/" source="CVE"/>
		<reference ref_id="CVE-2022-49442" ref_url="https://www.suse.com/security/cve/CVE-2022-49442/" source="CVE"/>
		<reference ref_id="CVE-2022-49451" ref_url="https://www.suse.com/security/cve/CVE-2022-49451/" source="CVE"/>
		<reference ref_id="CVE-2022-49471" ref_url="https://www.suse.com/security/cve/CVE-2022-49471/" source="CVE"/>
		<reference ref_id="CVE-2022-49492" ref_url="https://www.suse.com/security/cve/CVE-2022-49492/" source="CVE"/>
		<reference ref_id="CVE-2022-49511" ref_url="https://www.suse.com/security/cve/CVE-2022-49511/" source="CVE"/>
		<reference ref_id="CVE-2022-49513" ref_url="https://www.suse.com/security/cve/CVE-2022-49513/" source="CVE"/>
		<reference ref_id="CVE-2022-49519" ref_url="https://www.suse.com/security/cve/CVE-2022-49519/" source="CVE"/>
		<reference ref_id="CVE-2022-49520" ref_url="https://www.suse.com/security/cve/CVE-2022-49520/" source="CVE"/>
		<reference ref_id="CVE-2022-49539" ref_url="https://www.suse.com/security/cve/CVE-2022-49539/" source="CVE"/>
		<reference ref_id="CVE-2022-49541" ref_url="https://www.suse.com/security/cve/CVE-2022-49541/" source="CVE"/>
		<reference ref_id="CVE-2022-49548" ref_url="https://www.suse.com/security/cve/CVE-2022-49548/" source="CVE"/>
		<reference ref_id="CVE-2022-49552" ref_url="https://www.suse.com/security/cve/CVE-2022-49552/" source="CVE"/>
		<reference ref_id="CVE-2022-49562" ref_url="https://www.suse.com/security/cve/CVE-2022-49562/" source="CVE"/>
		<reference ref_id="CVE-2022-49565" ref_url="https://www.suse.com/security/cve/CVE-2022-49565/" source="CVE"/>
		<reference ref_id="CVE-2022-49572" ref_url="https://www.suse.com/security/cve/CVE-2022-49572/" source="CVE"/>
		<reference ref_id="CVE-2022-49573" ref_url="https://www.suse.com/security/cve/CVE-2022-49573/" source="CVE"/>
		<reference ref_id="CVE-2022-49574" ref_url="https://www.suse.com/security/cve/CVE-2022-49574/" source="CVE"/>
		<reference ref_id="CVE-2022-49575" ref_url="https://www.suse.com/security/cve/CVE-2022-49575/" source="CVE"/>
		<reference ref_id="CVE-2022-49577" ref_url="https://www.suse.com/security/cve/CVE-2022-49577/" source="CVE"/>
		<reference ref_id="CVE-2022-49578" ref_url="https://www.suse.com/security/cve/CVE-2022-49578/" source="CVE"/>
		<reference ref_id="CVE-2022-49579" ref_url="https://www.suse.com/security/cve/CVE-2022-49579/" source="CVE"/>
		<reference ref_id="CVE-2022-49580" ref_url="https://www.suse.com/security/cve/CVE-2022-49580/" source="CVE"/>
		<reference ref_id="CVE-2022-49583" ref_url="https://www.suse.com/security/cve/CVE-2022-49583/" source="CVE"/>
		<reference ref_id="CVE-2022-49585" ref_url="https://www.suse.com/security/cve/CVE-2022-49585/" source="CVE"/>
		<reference ref_id="CVE-2022-49586" ref_url="https://www.suse.com/security/cve/CVE-2022-49586/" source="CVE"/>
		<reference ref_id="CVE-2022-49587" ref_url="https://www.suse.com/security/cve/CVE-2022-49587/" source="CVE"/>
		<reference ref_id="CVE-2022-49588" ref_url="https://www.suse.com/security/cve/CVE-2022-49588/" source="CVE"/>
		<reference ref_id="CVE-2022-49589" ref_url="https://www.suse.com/security/cve/CVE-2022-49589/" source="CVE"/>
		<reference ref_id="CVE-2022-49590" ref_url="https://www.suse.com/security/cve/CVE-2022-49590/" source="CVE"/>
		<reference ref_id="CVE-2022-49592" ref_url="https://www.suse.com/security/cve/CVE-2022-49592/" source="CVE"/>
		<reference ref_id="CVE-2022-49593" ref_url="https://www.suse.com/security/cve/CVE-2022-49593/" source="CVE"/>
		<reference ref_id="CVE-2022-49594" ref_url="https://www.suse.com/security/cve/CVE-2022-49594/" source="CVE"/>
		<reference ref_id="CVE-2022-49595" ref_url="https://www.suse.com/security/cve/CVE-2022-49595/" source="CVE"/>
		<reference ref_id="CVE-2022-49596" ref_url="https://www.suse.com/security/cve/CVE-2022-49596/" source="CVE"/>
		<reference ref_id="CVE-2022-49598" ref_url="https://www.suse.com/security/cve/CVE-2022-49598/" source="CVE"/>
		<reference ref_id="CVE-2022-49599" ref_url="https://www.suse.com/security/cve/CVE-2022-49599/" source="CVE"/>
		<reference ref_id="CVE-2022-49600" ref_url="https://www.suse.com/security/cve/CVE-2022-49600/" source="CVE"/>
		<reference ref_id="CVE-2022-49601" ref_url="https://www.suse.com/security/cve/CVE-2022-49601/" source="CVE"/>
		<reference ref_id="CVE-2022-49602" ref_url="https://www.suse.com/security/cve/CVE-2022-49602/" source="CVE"/>
		<reference ref_id="CVE-2022-49603" ref_url="https://www.suse.com/security/cve/CVE-2022-49603/" source="CVE"/>
		<reference ref_id="CVE-2022-49604" ref_url="https://www.suse.com/security/cve/CVE-2022-49604/" source="CVE"/>
		<reference ref_id="CVE-2022-49612" ref_url="https://www.suse.com/security/cve/CVE-2022-49612/" source="CVE"/>
		<reference ref_id="CVE-2022-49629" ref_url="https://www.suse.com/security/cve/CVE-2022-49629/" source="CVE"/>
		<reference ref_id="CVE-2022-49630" ref_url="https://www.suse.com/security/cve/CVE-2022-49630/" source="CVE"/>
		<reference ref_id="CVE-2022-49631" ref_url="https://www.suse.com/security/cve/CVE-2022-49631/" source="CVE"/>
		<reference ref_id="CVE-2022-49632" ref_url="https://www.suse.com/security/cve/CVE-2022-49632/" source="CVE"/>
		<reference ref_id="CVE-2022-49634" ref_url="https://www.suse.com/security/cve/CVE-2022-49634/" source="CVE"/>
		<reference ref_id="CVE-2022-49636" ref_url="https://www.suse.com/security/cve/CVE-2022-49636/" source="CVE"/>
		<reference ref_id="CVE-2022-49637" ref_url="https://www.suse.com/security/cve/CVE-2022-49637/" source="CVE"/>
		<reference ref_id="CVE-2022-49638" ref_url="https://www.suse.com/security/cve/CVE-2022-49638/" source="CVE"/>
		<reference ref_id="CVE-2022-49639" ref_url="https://www.suse.com/security/cve/CVE-2022-49639/" source="CVE"/>
		<reference ref_id="CVE-2022-49641" ref_url="https://www.suse.com/security/cve/CVE-2022-49641/" source="CVE"/>
		<reference ref_id="CVE-2022-49642" ref_url="https://www.suse.com/security/cve/CVE-2022-49642/" source="CVE"/>
		<reference ref_id="CVE-2022-49644" ref_url="https://www.suse.com/security/cve/CVE-2022-49644/" source="CVE"/>
		<reference ref_id="CVE-2022-49646" ref_url="https://www.suse.com/security/cve/CVE-2022-49646/" source="CVE"/>
		<reference ref_id="CVE-2022-49647" ref_url="https://www.suse.com/security/cve/CVE-2022-49647/" source="CVE"/>
		<reference ref_id="CVE-2022-49651" ref_url="https://www.suse.com/security/cve/CVE-2022-49651/" source="CVE"/>
		<reference ref_id="CVE-2022-49655" ref_url="https://www.suse.com/security/cve/CVE-2022-49655/" source="CVE"/>
		<reference ref_id="CVE-2022-49659" ref_url="https://www.suse.com/security/cve/CVE-2022-49659/" source="CVE"/>
		<reference ref_id="CVE-2022-49666" ref_url="https://www.suse.com/security/cve/CVE-2022-49666/" source="CVE"/>
		<reference ref_id="CVE-2022-49688" ref_url="https://www.suse.com/security/cve/CVE-2022-49688/" source="CVE"/>
		<reference ref_id="CVE-2022-49700" ref_url="https://www.suse.com/security/cve/CVE-2022-49700/" source="CVE"/>
		<reference ref_id="CVE-2022-49723" ref_url="https://www.suse.com/security/cve/CVE-2022-49723/" source="CVE"/>
		<reference ref_id="CVE-2022-49726" ref_url="https://www.suse.com/security/cve/CVE-2022-49726/" source="CVE"/>
		<reference ref_id="CVE-2022-49739" ref_url="https://www.suse.com/security/cve/CVE-2022-49739/" source="CVE"/>
		<reference ref_id="CVE-2022-49753" ref_url="https://www.suse.com/security/cve/CVE-2022-49753/" source="CVE"/>
		<reference ref_id="CVE-2022-49848" ref_url="https://www.suse.com/security/cve/CVE-2022-49848/" source="CVE"/>
		<reference ref_id="CVE-2022-49853" ref_url="https://www.suse.com/security/cve/CVE-2022-49853/" source="CVE"/>
		<reference ref_id="CVE-2022-49862" ref_url="https://www.suse.com/security/cve/CVE-2022-49862/" source="CVE"/>
		<reference ref_id="CVE-2022-49872" ref_url="https://www.suse.com/security/cve/CVE-2022-49872/" source="CVE"/>
		<reference ref_id="CVE-2022-49902" ref_url="https://www.suse.com/security/cve/CVE-2022-49902/" source="CVE"/>
		<reference ref_id="CVE-2022-49903" ref_url="https://www.suse.com/security/cve/CVE-2022-49903/" source="CVE"/>
		<reference ref_id="CVE-2022-49908" ref_url="https://www.suse.com/security/cve/CVE-2022-49908/" source="CVE"/>
		<reference ref_id="CVE-2022-49911" ref_url="https://www.suse.com/security/cve/CVE-2022-49911/" source="CVE"/>
		<reference ref_id="CVE-2022-49920" ref_url="https://www.suse.com/security/cve/CVE-2022-49920/" source="CVE"/>
		<reference ref_id="CVE-2022-49925" ref_url="https://www.suse.com/security/cve/CVE-2022-49925/" source="CVE"/>
		<reference ref_id="CVE-2022-49934" ref_url="https://www.suse.com/security/cve/CVE-2022-49934/" source="CVE"/>
		<reference ref_id="CVE-2022-49935" ref_url="https://www.suse.com/security/cve/CVE-2022-49935/" source="CVE"/>
		<reference ref_id="CVE-2022-49936" ref_url="https://www.suse.com/security/cve/CVE-2022-49936/" source="CVE"/>
		<reference ref_id="CVE-2022-49942" ref_url="https://www.suse.com/security/cve/CVE-2022-49942/" source="CVE"/>
		<reference ref_id="CVE-2022-49943" ref_url="https://www.suse.com/security/cve/CVE-2022-49943/" source="CVE"/>
		<reference ref_id="CVE-2022-49944" ref_url="https://www.suse.com/security/cve/CVE-2022-49944/" source="CVE"/>
		<reference ref_id="CVE-2022-49951" ref_url="https://www.suse.com/security/cve/CVE-2022-49951/" source="CVE"/>
		<reference ref_id="CVE-2022-49958" ref_url="https://www.suse.com/security/cve/CVE-2022-49958/" source="CVE"/>
		<reference ref_id="CVE-2022-49959" ref_url="https://www.suse.com/security/cve/CVE-2022-49959/" source="CVE"/>
		<reference ref_id="CVE-2022-49960" ref_url="https://www.suse.com/security/cve/CVE-2022-49960/" source="CVE"/>
		<reference ref_id="CVE-2022-49961" ref_url="https://www.suse.com/security/cve/CVE-2022-49961/" source="CVE"/>
		<reference ref_id="CVE-2022-49962" ref_url="https://www.suse.com/security/cve/CVE-2022-49962/" source="CVE"/>
		<reference ref_id="CVE-2022-49964" ref_url="https://www.suse.com/security/cve/CVE-2022-49964/" source="CVE"/>
		<reference ref_id="CVE-2022-49965" ref_url="https://www.suse.com/security/cve/CVE-2022-49965/" source="CVE"/>
		<reference ref_id="CVE-2022-49966" ref_url="https://www.suse.com/security/cve/CVE-2022-49966/" source="CVE"/>
		<reference ref_id="CVE-2022-49967" ref_url="https://www.suse.com/security/cve/CVE-2022-49967/" source="CVE"/>
		<reference ref_id="CVE-2022-49969" ref_url="https://www.suse.com/security/cve/CVE-2022-49969/" source="CVE"/>
		<reference ref_id="CVE-2022-49970" ref_url="https://www.suse.com/security/cve/CVE-2022-49970/" source="CVE"/>
		<reference ref_id="CVE-2022-49971" ref_url="https://www.suse.com/security/cve/CVE-2022-49971/" source="CVE"/>
		<reference ref_id="CVE-2022-49973" ref_url="https://www.suse.com/security/cve/CVE-2022-49973/" source="CVE"/>
		<reference ref_id="CVE-2022-49974" ref_url="https://www.suse.com/security/cve/CVE-2022-49974/" source="CVE"/>
		<reference ref_id="CVE-2022-49979" ref_url="https://www.suse.com/security/cve/CVE-2022-49979/" source="CVE"/>
		<reference ref_id="CVE-2022-49980" ref_url="https://www.suse.com/security/cve/CVE-2022-49980/" source="CVE"/>
		<reference ref_id="CVE-2022-49981" ref_url="https://www.suse.com/security/cve/CVE-2022-49981/" source="CVE"/>
		<reference ref_id="CVE-2022-49982" ref_url="https://www.suse.com/security/cve/CVE-2022-49982/" source="CVE"/>
		<reference ref_id="CVE-2022-49983" ref_url="https://www.suse.com/security/cve/CVE-2022-49983/" source="CVE"/>
		<reference ref_id="CVE-2022-49984" ref_url="https://www.suse.com/security/cve/CVE-2022-49984/" source="CVE"/>
		<reference ref_id="CVE-2022-49985" ref_url="https://www.suse.com/security/cve/CVE-2022-49985/" source="CVE"/>
		<reference ref_id="CVE-2022-49986" ref_url="https://www.suse.com/security/cve/CVE-2022-49986/" source="CVE"/>
		<reference ref_id="CVE-2022-49990" ref_url="https://www.suse.com/security/cve/CVE-2022-49990/" source="CVE"/>
		<reference ref_id="CVE-2022-49991" ref_url="https://www.suse.com/security/cve/CVE-2022-49991/" source="CVE"/>
		<reference ref_id="CVE-2022-49992" ref_url="https://www.suse.com/security/cve/CVE-2022-49992/" source="CVE"/>
		<reference ref_id="CVE-2022-49993" ref_url="https://www.suse.com/security/cve/CVE-2022-49993/" source="CVE"/>
		<reference ref_id="CVE-2022-49994" ref_url="https://www.suse.com/security/cve/CVE-2022-49994/" source="CVE"/>
		<reference ref_id="CVE-2022-49995" ref_url="https://www.suse.com/security/cve/CVE-2022-49995/" source="CVE"/>
		<reference ref_id="CVE-2022-49998" ref_url="https://www.suse.com/security/cve/CVE-2022-49998/" source="CVE"/>
		<reference ref_id="CVE-2022-50002" ref_url="https://www.suse.com/security/cve/CVE-2022-50002/" source="CVE"/>
		<reference ref_id="CVE-2022-50003" ref_url="https://www.suse.com/security/cve/CVE-2022-50003/" source="CVE"/>
		<reference ref_id="CVE-2022-50006" ref_url="https://www.suse.com/security/cve/CVE-2022-50006/" source="CVE"/>
		<reference ref_id="CVE-2022-50007" ref_url="https://www.suse.com/security/cve/CVE-2022-50007/" source="CVE"/>
		<reference ref_id="CVE-2022-50014" ref_url="https://www.suse.com/security/cve/CVE-2022-50014/" source="CVE"/>
		<reference ref_id="CVE-2022-50015" ref_url="https://www.suse.com/security/cve/CVE-2022-50015/" source="CVE"/>
		<reference ref_id="CVE-2022-50016" ref_url="https://www.suse.com/security/cve/CVE-2022-50016/" source="CVE"/>
		<reference ref_id="CVE-2022-50020" ref_url="https://www.suse.com/security/cve/CVE-2022-50020/" source="CVE"/>
		<reference ref_id="CVE-2022-50021" ref_url="https://www.suse.com/security/cve/CVE-2022-50021/" source="CVE"/>
		<reference ref_id="CVE-2022-50022" ref_url="https://www.suse.com/security/cve/CVE-2022-50022/" source="CVE"/>
		<reference ref_id="CVE-2022-50028" ref_url="https://www.suse.com/security/cve/CVE-2022-50028/" source="CVE"/>
		<reference ref_id="CVE-2022-50029" ref_url="https://www.suse.com/security/cve/CVE-2022-50029/" source="CVE"/>
		<reference ref_id="CVE-2022-50032" ref_url="https://www.suse.com/security/cve/CVE-2022-50032/" source="CVE"/>
		<reference ref_id="CVE-2022-50033" ref_url="https://www.suse.com/security/cve/CVE-2022-50033/" source="CVE"/>
		<reference ref_id="CVE-2022-50034" ref_url="https://www.suse.com/security/cve/CVE-2022-50034/" source="CVE"/>
		<reference ref_id="CVE-2022-50035" ref_url="https://www.suse.com/security/cve/CVE-2022-50035/" source="CVE"/>
		<reference ref_id="CVE-2022-50037" ref_url="https://www.suse.com/security/cve/CVE-2022-50037/" source="CVE"/>
		<reference ref_id="CVE-2022-50039" ref_url="https://www.suse.com/security/cve/CVE-2022-50039/" source="CVE"/>
		<reference ref_id="CVE-2022-50041" ref_url="https://www.suse.com/security/cve/CVE-2022-50041/" source="CVE"/>
		<reference ref_id="CVE-2022-50044" ref_url="https://www.suse.com/security/cve/CVE-2022-50044/" source="CVE"/>
		<reference ref_id="CVE-2022-50046" ref_url="https://www.suse.com/security/cve/CVE-2022-50046/" source="CVE"/>
		<reference ref_id="CVE-2022-50049" ref_url="https://www.suse.com/security/cve/CVE-2022-50049/" source="CVE"/>
		<reference ref_id="CVE-2022-50050" ref_url="https://www.suse.com/security/cve/CVE-2022-50050/" source="CVE"/>
		<reference ref_id="CVE-2022-50051" ref_url="https://www.suse.com/security/cve/CVE-2022-50051/" source="CVE"/>
		<reference ref_id="CVE-2022-50052" ref_url="https://www.suse.com/security/cve/CVE-2022-50052/" source="CVE"/>
		<reference ref_id="CVE-2022-50053" ref_url="https://www.suse.com/security/cve/CVE-2022-50053/" source="CVE"/>
		<reference ref_id="CVE-2022-50054" ref_url="https://www.suse.com/security/cve/CVE-2022-50054/" source="CVE"/>
		<reference ref_id="CVE-2022-50055" ref_url="https://www.suse.com/security/cve/CVE-2022-50055/" source="CVE"/>
		<reference ref_id="CVE-2022-50058" ref_url="https://www.suse.com/security/cve/CVE-2022-50058/" source="CVE"/>
		<reference ref_id="CVE-2022-50068" ref_url="https://www.suse.com/security/cve/CVE-2022-50068/" source="CVE"/>
		<reference ref_id="CVE-2022-50069" ref_url="https://www.suse.com/security/cve/CVE-2022-50069/" source="CVE"/>
		<reference ref_id="CVE-2022-50070" ref_url="https://www.suse.com/security/cve/CVE-2022-50070/" source="CVE"/>
		<reference ref_id="CVE-2022-50079" ref_url="https://www.suse.com/security/cve/CVE-2022-50079/" source="CVE"/>
		<reference ref_id="CVE-2022-50081" ref_url="https://www.suse.com/security/cve/CVE-2022-50081/" source="CVE"/>
		<reference ref_id="CVE-2022-50083" ref_url="https://www.suse.com/security/cve/CVE-2022-50083/" source="CVE"/>
		<reference ref_id="CVE-2022-50086" ref_url="https://www.suse.com/security/cve/CVE-2022-50086/" source="CVE"/>
		<reference ref_id="CVE-2022-50088" ref_url="https://www.suse.com/security/cve/CVE-2022-50088/" source="CVE"/>
		<reference ref_id="CVE-2022-50093" ref_url="https://www.suse.com/security/cve/CVE-2022-50093/" source="CVE"/>
		<reference ref_id="CVE-2022-50100" ref_url="https://www.suse.com/security/cve/CVE-2022-50100/" source="CVE"/>
		<reference ref_id="CVE-2022-50111" ref_url="https://www.suse.com/security/cve/CVE-2022-50111/" source="CVE"/>
		<reference ref_id="CVE-2022-50113" ref_url="https://www.suse.com/security/cve/CVE-2022-50113/" source="CVE"/>
		<reference ref_id="CVE-2022-50120" ref_url="https://www.suse.com/security/cve/CVE-2022-50120/" source="CVE"/>
		<reference ref_id="CVE-2022-50122" ref_url="https://www.suse.com/security/cve/CVE-2022-50122/" source="CVE"/>
		<reference ref_id="CVE-2022-50123" ref_url="https://www.suse.com/security/cve/CVE-2022-50123/" source="CVE"/>
		<reference ref_id="CVE-2022-50124" ref_url="https://www.suse.com/security/cve/CVE-2022-50124/" source="CVE"/>
		<reference ref_id="CVE-2022-50125" ref_url="https://www.suse.com/security/cve/CVE-2022-50125/" source="CVE"/>
		<reference ref_id="CVE-2022-50126" ref_url="https://www.suse.com/security/cve/CVE-2022-50126/" source="CVE"/>
		<reference ref_id="CVE-2022-50129" ref_url="https://www.suse.com/security/cve/CVE-2022-50129/" source="CVE"/>
		<reference ref_id="CVE-2022-50131" ref_url="https://www.suse.com/security/cve/CVE-2022-50131/" source="CVE"/>
		<reference ref_id="CVE-2022-50132" ref_url="https://www.suse.com/security/cve/CVE-2022-50132/" source="CVE"/>
		<reference ref_id="CVE-2022-50133" ref_url="https://www.suse.com/security/cve/CVE-2022-50133/" source="CVE"/>
		<reference ref_id="CVE-2022-50136" ref_url="https://www.suse.com/security/cve/CVE-2022-50136/" source="CVE"/>
		<reference ref_id="CVE-2022-50137" ref_url="https://www.suse.com/security/cve/CVE-2022-50137/" source="CVE"/>
		<reference ref_id="CVE-2022-50138" ref_url="https://www.suse.com/security/cve/CVE-2022-50138/" source="CVE"/>
		<reference ref_id="CVE-2022-50139" ref_url="https://www.suse.com/security/cve/CVE-2022-50139/" source="CVE"/>
		<reference ref_id="CVE-2022-50146" ref_url="https://www.suse.com/security/cve/CVE-2022-50146/" source="CVE"/>
		<reference ref_id="CVE-2022-50147" ref_url="https://www.suse.com/security/cve/CVE-2022-50147/" source="CVE"/>
		<reference ref_id="CVE-2022-50148" ref_url="https://www.suse.com/security/cve/CVE-2022-50148/" source="CVE"/>
		<reference ref_id="CVE-2022-50149" ref_url="https://www.suse.com/security/cve/CVE-2022-50149/" source="CVE"/>
		<reference ref_id="CVE-2022-50151" ref_url="https://www.suse.com/security/cve/CVE-2022-50151/" source="CVE"/>
		<reference ref_id="CVE-2022-50152" ref_url="https://www.suse.com/security/cve/CVE-2022-50152/" source="CVE"/>
		<reference ref_id="CVE-2022-50153" ref_url="https://www.suse.com/security/cve/CVE-2022-50153/" source="CVE"/>
		<reference ref_id="CVE-2022-50154" ref_url="https://www.suse.com/security/cve/CVE-2022-50154/" source="CVE"/>
		<reference ref_id="CVE-2022-50156" ref_url="https://www.suse.com/security/cve/CVE-2022-50156/" source="CVE"/>
		<reference ref_id="CVE-2022-50157" ref_url="https://www.suse.com/security/cve/CVE-2022-50157/" source="CVE"/>
		<reference ref_id="CVE-2022-50164" ref_url="https://www.suse.com/security/cve/CVE-2022-50164/" source="CVE"/>
		<reference ref_id="CVE-2022-50166" ref_url="https://www.suse.com/security/cve/CVE-2022-50166/" source="CVE"/>
		<reference ref_id="CVE-2022-50168" ref_url="https://www.suse.com/security/cve/CVE-2022-50168/" source="CVE"/>
		<reference ref_id="CVE-2022-50172" ref_url="https://www.suse.com/security/cve/CVE-2022-50172/" source="CVE"/>
		<reference ref_id="CVE-2022-50181" ref_url="https://www.suse.com/security/cve/CVE-2022-50181/" source="CVE"/>
		<reference ref_id="CVE-2022-50185" ref_url="https://www.suse.com/security/cve/CVE-2022-50185/" source="CVE"/>
		<reference ref_id="CVE-2022-50189" ref_url="https://www.suse.com/security/cve/CVE-2022-50189/" source="CVE"/>
		<reference ref_id="CVE-2022-50190" ref_url="https://www.suse.com/security/cve/CVE-2022-50190/" source="CVE"/>
		<reference ref_id="CVE-2022-50194" ref_url="https://www.suse.com/security/cve/CVE-2022-50194/" source="CVE"/>
		<reference ref_id="CVE-2022-50196" ref_url="https://www.suse.com/security/cve/CVE-2022-50196/" source="CVE"/>
		<reference ref_id="CVE-2022-50206" ref_url="https://www.suse.com/security/cve/CVE-2022-50206/" source="CVE"/>
		<reference ref_id="CVE-2022-50211" ref_url="https://www.suse.com/security/cve/CVE-2022-50211/" source="CVE"/>
		<reference ref_id="CVE-2022-50215" ref_url="https://www.suse.com/security/cve/CVE-2022-50215/" source="CVE"/>
		<reference ref_id="CVE-2022-50219" ref_url="https://www.suse.com/security/cve/CVE-2022-50219/" source="CVE"/>
		<reference ref_id="CVE-2022-50221" ref_url="https://www.suse.com/security/cve/CVE-2022-50221/" source="CVE"/>
		<reference ref_id="CVE-2022-50224" ref_url="https://www.suse.com/security/cve/CVE-2022-50224/" source="CVE"/>
		<reference ref_id="CVE-2022-50226" ref_url="https://www.suse.com/security/cve/CVE-2022-50226/" source="CVE"/>
		<reference ref_id="CVE-2022-50227" ref_url="https://www.suse.com/security/cve/CVE-2022-50227/" source="CVE"/>
		<reference ref_id="CVE-2022-50228" ref_url="https://www.suse.com/security/cve/CVE-2022-50228/" source="CVE"/>
		<reference ref_id="CVE-2022-50229" ref_url="https://www.suse.com/security/cve/CVE-2022-50229/" source="CVE"/>
		<reference ref_id="CVE-2022-50235" ref_url="https://www.suse.com/security/cve/CVE-2022-50235/" source="CVE"/>
		<reference ref_id="CVE-2022-50241" ref_url="https://www.suse.com/security/cve/CVE-2022-50241/" source="CVE"/>
		<reference ref_id="CVE-2022-50243" ref_url="https://www.suse.com/security/cve/CVE-2022-50243/" source="CVE"/>
		<reference ref_id="CVE-2022-50263" ref_url="https://www.suse.com/security/cve/CVE-2022-50263/" source="CVE"/>
		<reference ref_id="CVE-2022-50271" ref_url="https://www.suse.com/security/cve/CVE-2022-50271/" source="CVE"/>
		<reference ref_id="CVE-2022-50285" ref_url="https://www.suse.com/security/cve/CVE-2022-50285/" source="CVE"/>
		<reference ref_id="CVE-2022-50299" ref_url="https://www.suse.com/security/cve/CVE-2022-50299/" source="CVE"/>
		<reference ref_id="CVE-2022-50302" ref_url="https://www.suse.com/security/cve/CVE-2022-50302/" source="CVE"/>
		<reference ref_id="CVE-2022-50306" ref_url="https://www.suse.com/security/cve/CVE-2022-50306/" source="CVE"/>
		<reference ref_id="CVE-2022-50308" ref_url="https://www.suse.com/security/cve/CVE-2022-50308/" source="CVE"/>
		<reference ref_id="CVE-2022-50318" ref_url="https://www.suse.com/security/cve/CVE-2022-50318/" source="CVE"/>
		<reference ref_id="CVE-2022-50325" ref_url="https://www.suse.com/security/cve/CVE-2022-50325/" source="CVE"/>
		<reference ref_id="CVE-2022-50326" ref_url="https://www.suse.com/security/cve/CVE-2022-50326/" source="CVE"/>
		<reference ref_id="CVE-2022-50344" ref_url="https://www.suse.com/security/cve/CVE-2022-50344/" source="CVE"/>
		<reference ref_id="CVE-2022-50348" ref_url="https://www.suse.com/security/cve/CVE-2022-50348/" source="CVE"/>
		<reference ref_id="CVE-2022-50350" ref_url="https://www.suse.com/security/cve/CVE-2022-50350/" source="CVE"/>
		<reference ref_id="CVE-2022-50363" ref_url="https://www.suse.com/security/cve/CVE-2022-50363/" source="CVE"/>
		<reference ref_id="CVE-2022-50381" ref_url="https://www.suse.com/security/cve/CVE-2022-50381/" source="CVE"/>
		<reference ref_id="CVE-2022-50385" ref_url="https://www.suse.com/security/cve/CVE-2022-50385/" source="CVE"/>
		<reference ref_id="CVE-2022-50388" ref_url="https://www.suse.com/security/cve/CVE-2022-50388/" source="CVE"/>
		<reference ref_id="CVE-2022-50392" ref_url="https://www.suse.com/security/cve/CVE-2022-50392/" source="CVE"/>
		<reference ref_id="CVE-2022-50396" ref_url="https://www.suse.com/security/cve/CVE-2022-50396/" source="CVE"/>
		<reference ref_id="CVE-2022-50402" ref_url="https://www.suse.com/security/cve/CVE-2022-50402/" source="CVE"/>
		<reference ref_id="CVE-2022-50403" ref_url="https://www.suse.com/security/cve/CVE-2022-50403/" source="CVE"/>
		<reference ref_id="CVE-2022-50405" ref_url="https://www.suse.com/security/cve/CVE-2022-50405/" source="CVE"/>
		<reference ref_id="CVE-2022-50408" ref_url="https://www.suse.com/security/cve/CVE-2022-50408/" source="CVE"/>
		<reference ref_id="CVE-2022-50410" ref_url="https://www.suse.com/security/cve/CVE-2022-50410/" source="CVE"/>
		<reference ref_id="CVE-2022-50418" ref_url="https://www.suse.com/security/cve/CVE-2022-50418/" source="CVE"/>
		<reference ref_id="CVE-2022-50425" ref_url="https://www.suse.com/security/cve/CVE-2022-50425/" source="CVE"/>
		<reference ref_id="CVE-2022-50427" ref_url="https://www.suse.com/security/cve/CVE-2022-50427/" source="CVE"/>
		<reference ref_id="CVE-2022-50431" ref_url="https://www.suse.com/security/cve/CVE-2022-50431/" source="CVE"/>
		<reference ref_id="CVE-2022-50436" ref_url="https://www.suse.com/security/cve/CVE-2022-50436/" source="CVE"/>
		<reference ref_id="CVE-2022-50439" ref_url="https://www.suse.com/security/cve/CVE-2022-50439/" source="CVE"/>
		<reference ref_id="CVE-2022-50452" ref_url="https://www.suse.com/security/cve/CVE-2022-50452/" source="CVE"/>
		<reference ref_id="CVE-2022-50459" ref_url="https://www.suse.com/security/cve/CVE-2022-50459/" source="CVE"/>
		<reference ref_id="CVE-2022-50465" ref_url="https://www.suse.com/security/cve/CVE-2022-50465/" source="CVE"/>
		<reference ref_id="CVE-2022-50467" ref_url="https://www.suse.com/security/cve/CVE-2022-50467/" source="CVE"/>
		<reference ref_id="CVE-2022-50484" ref_url="https://www.suse.com/security/cve/CVE-2022-50484/" source="CVE"/>
		<reference ref_id="CVE-2022-50487" ref_url="https://www.suse.com/security/cve/CVE-2022-50487/" source="CVE"/>
		<reference ref_id="CVE-2022-50496" ref_url="https://www.suse.com/security/cve/CVE-2022-50496/" source="CVE"/>
		<reference ref_id="CVE-2022-50506" ref_url="https://www.suse.com/security/cve/CVE-2022-50506/" source="CVE"/>
		<reference ref_id="CVE-2022-50512" ref_url="https://www.suse.com/security/cve/CVE-2022-50512/" source="CVE"/>
		<reference ref_id="CVE-2022-50516" ref_url="https://www.suse.com/security/cve/CVE-2022-50516/" source="CVE"/>
		<reference ref_id="CVE-2022-50530" ref_url="https://www.suse.com/security/cve/CVE-2022-50530/" source="CVE"/>
		<reference ref_id="CVE-2022-50531" ref_url="https://www.suse.com/security/cve/CVE-2022-50531/" source="CVE"/>
		<reference ref_id="CVE-2022-50534" ref_url="https://www.suse.com/security/cve/CVE-2022-50534/" source="CVE"/>
		<reference ref_id="CVE-2022-50546" ref_url="https://www.suse.com/security/cve/CVE-2022-50546/" source="CVE"/>
		<reference ref_id="CVE-2022-50549" ref_url="https://www.suse.com/security/cve/CVE-2022-50549/" source="CVE"/>
		<reference ref_id="CVE-2022-50554" ref_url="https://www.suse.com/security/cve/CVE-2022-50554/" source="CVE"/>
		<reference ref_id="CVE-2022-50555" ref_url="https://www.suse.com/security/cve/CVE-2022-50555/" source="CVE"/>
		<reference ref_id="CVE-2022-50563" ref_url="https://www.suse.com/security/cve/CVE-2022-50563/" source="CVE"/>
		<reference ref_id="CVE-2022-50569" ref_url="https://www.suse.com/security/cve/CVE-2022-50569/" source="CVE"/>
		<reference ref_id="CVE-2022-50580" ref_url="https://www.suse.com/security/cve/CVE-2022-50580/" source="CVE"/>
		<reference ref_id="CVE-2022-50583" ref_url="https://www.suse.com/security/cve/CVE-2022-50583/" source="CVE"/>
		<reference ref_id="CVE-2022-50615" ref_url="https://www.suse.com/security/cve/CVE-2022-50615/" source="CVE"/>
		<reference ref_id="CVE-2022-50622" ref_url="https://www.suse.com/security/cve/CVE-2022-50622/" source="CVE"/>
		<reference ref_id="CVE-2022-50635" ref_url="https://www.suse.com/security/cve/CVE-2022-50635/" source="CVE"/>
		<reference ref_id="CVE-2022-50668" ref_url="https://www.suse.com/security/cve/CVE-2022-50668/" source="CVE"/>
		<reference ref_id="CVE-2022-50678" ref_url="https://www.suse.com/security/cve/CVE-2022-50678/" source="CVE"/>
		<reference ref_id="CVE-2022-50679" ref_url="https://www.suse.com/security/cve/CVE-2022-50679/" source="CVE"/>
		<reference ref_id="CVE-2022-50698" ref_url="https://www.suse.com/security/cve/CVE-2022-50698/" source="CVE"/>
		<reference ref_id="CVE-2022-50702" ref_url="https://www.suse.com/security/cve/CVE-2022-50702/" source="CVE"/>
		<reference ref_id="CVE-2022-50703" ref_url="https://www.suse.com/security/cve/CVE-2022-50703/" source="CVE"/>
		<reference ref_id="CVE-2022-50714" ref_url="https://www.suse.com/security/cve/CVE-2022-50714/" source="CVE"/>
		<reference ref_id="CVE-2022-50715" ref_url="https://www.suse.com/security/cve/CVE-2022-50715/" source="CVE"/>
		<reference ref_id="CVE-2022-50717" ref_url="https://www.suse.com/security/cve/CVE-2022-50717/" source="CVE"/>
		<reference ref_id="CVE-2022-50723" ref_url="https://www.suse.com/security/cve/CVE-2022-50723/" source="CVE"/>
		<reference ref_id="CVE-2022-50726" ref_url="https://www.suse.com/security/cve/CVE-2022-50726/" source="CVE"/>
		<reference ref_id="CVE-2022-50730" ref_url="https://www.suse.com/security/cve/CVE-2022-50730/" source="CVE"/>
		<reference ref_id="CVE-2022-50738" ref_url="https://www.suse.com/security/cve/CVE-2022-50738/" source="CVE"/>
		<reference ref_id="CVE-2022-50744" ref_url="https://www.suse.com/security/cve/CVE-2022-50744/" source="CVE"/>
		<reference ref_id="CVE-2022-50752" ref_url="https://www.suse.com/security/cve/CVE-2022-50752/" source="CVE"/>
		<reference ref_id="CVE-2022-50768" ref_url="https://www.suse.com/security/cve/CVE-2022-50768/" source="CVE"/>
		<reference ref_id="CVE-2022-50773" ref_url="https://www.suse.com/security/cve/CVE-2022-50773/" source="CVE"/>
		<reference ref_id="CVE-2022-50778" ref_url="https://www.suse.com/security/cve/CVE-2022-50778/" source="CVE"/>
		<reference ref_id="CVE-2022-50783" ref_url="https://www.suse.com/security/cve/CVE-2022-50783/" source="CVE"/>
		<reference ref_id="CVE-2022-50816" ref_url="https://www.suse.com/security/cve/CVE-2022-50816/" source="CVE"/>
		<reference ref_id="CVE-2022-50833" ref_url="https://www.suse.com/security/cve/CVE-2022-50833/" source="CVE"/>
		<reference ref_id="CVE-2022-50835" ref_url="https://www.suse.com/security/cve/CVE-2022-50835/" source="CVE"/>
		<reference ref_id="CVE-2022-50839" ref_url="https://www.suse.com/security/cve/CVE-2022-50839/" source="CVE"/>
		<reference ref_id="CVE-2022-50843" ref_url="https://www.suse.com/security/cve/CVE-2022-50843/" source="CVE"/>
		<reference ref_id="CVE-2022-50855" ref_url="https://www.suse.com/security/cve/CVE-2022-50855/" source="CVE"/>
		<reference ref_id="CVE-2022-50861" ref_url="https://www.suse.com/security/cve/CVE-2022-50861/" source="CVE"/>
		<reference ref_id="CVE-2022-50863" ref_url="https://www.suse.com/security/cve/CVE-2022-50863/" source="CVE"/>
		<reference ref_id="CVE-2022-50866" ref_url="https://www.suse.com/security/cve/CVE-2022-50866/" source="CVE"/>
		<reference ref_id="CVE-2022-50889" ref_url="https://www.suse.com/security/cve/CVE-2022-50889/" source="CVE"/>
		<reference ref_id="CVE-2023-0394" ref_url="https://www.suse.com/security/cve/CVE-2023-0394/" source="CVE"/>
		<reference ref_id="CVE-2023-0461" ref_url="https://www.suse.com/security/cve/CVE-2023-0461/" source="CVE"/>
		<reference ref_id="CVE-2023-0590" ref_url="https://www.suse.com/security/cve/CVE-2023-0590/" source="CVE"/>
		<reference ref_id="CVE-2023-1195" ref_url="https://www.suse.com/security/cve/CVE-2023-1195/" source="CVE"/>
		<reference ref_id="CVE-2023-1382" ref_url="https://www.suse.com/security/cve/CVE-2023-1382/" source="CVE"/>
		<reference ref_id="CVE-2023-2177" ref_url="https://www.suse.com/security/cve/CVE-2023-2177/" source="CVE"/>
		<reference ref_id="CVE-2023-22998" ref_url="https://www.suse.com/security/cve/CVE-2023-22998/" source="CVE"/>
		<reference ref_id="CVE-2023-2513" ref_url="https://www.suse.com/security/cve/CVE-2023-2513/" source="CVE"/>
		<reference ref_id="CVE-2023-52340" ref_url="https://www.suse.com/security/cve/CVE-2023-52340/" source="CVE"/>
		<reference ref_id="CVE-2023-52905" ref_url="https://www.suse.com/security/cve/CVE-2023-52905/" source="CVE"/>
		<reference ref_id="CVE-2023-53020" ref_url="https://www.suse.com/security/cve/CVE-2023-53020/" source="CVE"/>
		<reference ref_id="CVE-2023-53021" ref_url="https://www.suse.com/security/cve/CVE-2023-53021/" source="CVE"/>
		<reference ref_id="CVE-2023-53029" ref_url="https://www.suse.com/security/cve/CVE-2023-53029/" source="CVE"/>
		<reference ref_id="CVE-2023-53030" ref_url="https://www.suse.com/security/cve/CVE-2023-53030/" source="CVE"/>
		<reference ref_id="CVE-2023-53033" ref_url="https://www.suse.com/security/cve/CVE-2023-53033/" source="CVE"/>
		<reference ref_id="CVE-2023-53064" ref_url="https://www.suse.com/security/cve/CVE-2023-53064/" source="CVE"/>
		<reference ref_id="CVE-2023-53083" ref_url="https://www.suse.com/security/cve/CVE-2023-53083/" source="CVE"/>
		<reference ref_id="CVE-2023-53273" ref_url="https://www.suse.com/security/cve/CVE-2023-53273/" source="CVE"/>
		<reference ref_id="CVE-2023-53381" ref_url="https://www.suse.com/security/cve/CVE-2023-53381/" source="CVE"/>
		<reference ref_id="CVE-2023-53393" ref_url="https://www.suse.com/security/cve/CVE-2023-53393/" source="CVE"/>
		<reference ref_id="CVE-2023-53552" ref_url="https://www.suse.com/security/cve/CVE-2023-53552/" source="CVE"/>
		<reference ref_id="CVE-2023-53606" ref_url="https://www.suse.com/security/cve/CVE-2023-53606/" source="CVE"/>
		<reference ref_id="CVE-2023-53634" ref_url="https://www.suse.com/security/cve/CVE-2023-53634/" source="CVE"/>
		<reference ref_id="CVE-2023-53765" ref_url="https://www.suse.com/security/cve/CVE-2023-53765/" source="CVE"/>
		<reference ref_id="CVE-2023-53809" ref_url="https://www.suse.com/security/cve/CVE-2023-53809/" source="CVE"/>
		<reference ref_id="CVE-2023-53811" ref_url="https://www.suse.com/security/cve/CVE-2023-53811/" source="CVE"/>
		<reference ref_id="CVE-2025-21867" ref_url="https://www.suse.com/security/cve/CVE-2025-21867/" source="CVE"/>
		<reference ref_id="CVE-2025-38393" ref_url="https://www.suse.com/security/cve/CVE-2025-38393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2458.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2458.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26341/">CVE-2021-26341 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26341">CVE-2021-26341 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33631/">CVE-2021-33631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33631">CVE-2021-33631 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33655/">CVE-2021-33655 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47393/">CVE-2021-47393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47393">CVE-2021-47393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47441/">CVE-2021-47441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47441">CVE-2021-47441 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47560/">CVE-2021-47560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47560">CVE-2021-47560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47592/">CVE-2021-47592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47592">CVE-2021-47592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47671/">CVE-2021-47671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47671">CVE-2021-47671 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1789/">CVE-2022-1789 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1789">CVE-2022-1789 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1882/">CVE-2022-1882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1882">CVE-2022-1882 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20141/">CVE-2022-20141 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20141">CVE-2022-20141 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21505/">CVE-2022-21505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-21505">CVE-2022-21505 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2196/">CVE-2022-2196 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2663/">CVE-2022-2663 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3028/">CVE-2022-3028 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33743/">CVE-2022-33743 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33743">CVE-2022-33743 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3522/">CVE-2022-3522 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3522">CVE-2022-3522 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3524/">CVE-2022-3524 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3524">CVE-2022-3524 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3566/">CVE-2022-3566 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3566">CVE-2022-3566 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3567/">CVE-2022-3567 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3567">CVE-2022-3567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3619/">CVE-2022-3619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3623/">CVE-2022-3623 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3623">CVE-2022-3623 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3625/">CVE-2022-3625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3625">CVE-2022-3625 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3628/">CVE-2022-3628 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36280/">CVE-2022-36280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36879/">CVE-2022-36879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36879">CVE-2022-36879 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3707/">CVE-2022-3707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3707">CVE-2022-3707 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39188/">CVE-2022-39188 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39188">CVE-2022-39188 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39189/">CVE-2022-39189 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39189">CVE-2022-39189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4128/">CVE-2022-4128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4128">CVE-2022-4128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4129/">CVE-2022-4129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4129">CVE-2022-4129 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41674/">CVE-2022-41674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42703/">CVE-2022-42703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42703">CVE-2022-42703 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42720/">CVE-2022-42720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42721/">CVE-2022-42721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42722/">CVE-2022-42722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-42896/">CVE-2022-42896 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896">CVE-2022-42896 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4662/">CVE-2022-4662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4662">CVE-2022-4662 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-47929/">CVE-2022-47929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47929">CVE-2022-47929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48695/">CVE-2022-48695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48695">CVE-2022-48695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48696/">CVE-2022-48696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48696">CVE-2022-48696 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48883/">CVE-2022-48883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48883">CVE-2022-48883 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48884/">CVE-2022-48884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48884">CVE-2022-48884 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48885/">CVE-2022-48885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48885">CVE-2022-48885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48915/">CVE-2022-48915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48915">CVE-2022-48915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48934/">CVE-2022-48934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48934">CVE-2022-48934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48939/">CVE-2022-48939 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48939">CVE-2022-48939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48942/">CVE-2022-48942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48942">CVE-2022-48942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48974/">CVE-2022-48974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48974">CVE-2022-48974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48976/">CVE-2022-48976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48976">CVE-2022-48976 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48978/">CVE-2022-48978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48978">CVE-2022-48978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48992/">CVE-2022-48992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48992">CVE-2022-48992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49010/">CVE-2022-49010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49010">CVE-2022-49010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49022/">CVE-2022-49022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49022">CVE-2022-49022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49049/">CVE-2022-49049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49049">CVE-2022-49049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49058/">CVE-2022-49058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49058">CVE-2022-49058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49070/">CVE-2022-49070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49070">CVE-2022-49070 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49072/">CVE-2022-49072 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49072">CVE-2022-49072 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49080/">CVE-2022-49080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49080">CVE-2022-49080 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49081/">CVE-2022-49081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49081">CVE-2022-49081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49087/">CVE-2022-49087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49087">CVE-2022-49087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49097/">CVE-2022-49097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49097">CVE-2022-49097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49111/">CVE-2022-49111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49111">CVE-2022-49111 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49114/">CVE-2022-49114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49114">CVE-2022-49114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49116/">CVE-2022-49116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49116">CVE-2022-49116 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49136/">CVE-2022-49136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49136">CVE-2022-49136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49204/">CVE-2022-49204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49204">CVE-2022-49204 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49205/">CVE-2022-49205 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49205">CVE-2022-49205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49207/">CVE-2022-49207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49207">CVE-2022-49207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49214/">CVE-2022-49214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49214">CVE-2022-49214 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49223/">CVE-2022-49223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49223">CVE-2022-49223 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49236/">CVE-2022-49236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49236">CVE-2022-49236 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49275/">CVE-2022-49275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49275">CVE-2022-49275 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49283/">CVE-2022-49283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49283">CVE-2022-49283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49294/">CVE-2022-49294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49294">CVE-2022-49294 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49319/">CVE-2022-49319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49319">CVE-2022-49319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49323/">CVE-2022-49323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49323">CVE-2022-49323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49328/">CVE-2022-49328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49328">CVE-2022-49328 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49333/">CVE-2022-49333 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49333">CVE-2022-49333 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49345/">CVE-2022-49345 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49345">CVE-2022-49345 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49356/">CVE-2022-49356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49356">CVE-2022-49356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49362/">CVE-2022-49362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49362">CVE-2022-49362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49365/">CVE-2022-49365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49365">CVE-2022-49365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49371/">CVE-2022-49371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49371">CVE-2022-49371 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49372/">CVE-2022-49372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49372">CVE-2022-49372 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49376/">CVE-2022-49376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49376">CVE-2022-49376 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49379/">CVE-2022-49379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49379">CVE-2022-49379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49401/">CVE-2022-49401 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49401">CVE-2022-49401 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49416/">CVE-2022-49416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49416">CVE-2022-49416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49429/">CVE-2022-49429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49429">CVE-2022-49429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49434/">CVE-2022-49434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49434">CVE-2022-49434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49442/">CVE-2022-49442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49442">CVE-2022-49442 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49451/">CVE-2022-49451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49451">CVE-2022-49451 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49471/">CVE-2022-49471 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49471">CVE-2022-49471 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49492/">CVE-2022-49492 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49492">CVE-2022-49492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49511/">CVE-2022-49511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49511">CVE-2022-49511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49513/">CVE-2022-49513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49513">CVE-2022-49513 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49519/">CVE-2022-49519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49519">CVE-2022-49519 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49520/">CVE-2022-49520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49520">CVE-2022-49520 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49539/">CVE-2022-49539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49539">CVE-2022-49539 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49541/">CVE-2022-49541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49541">CVE-2022-49541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49548/">CVE-2022-49548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49548">CVE-2022-49548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49552/">CVE-2022-49552 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49552">CVE-2022-49552 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49562/">CVE-2022-49562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49562">CVE-2022-49562 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49565/">CVE-2022-49565 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49565">CVE-2022-49565 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49572/">CVE-2022-49572 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49572">CVE-2022-49572 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49573/">CVE-2022-49573 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49573">CVE-2022-49573 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49574/">CVE-2022-49574 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49574">CVE-2022-49574 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49575/">CVE-2022-49575 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49575">CVE-2022-49575 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49577/">CVE-2022-49577 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49577">CVE-2022-49577 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49578/">CVE-2022-49578 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49578">CVE-2022-49578 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49579/">CVE-2022-49579 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49579">CVE-2022-49579 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49580/">CVE-2022-49580 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49580">CVE-2022-49580 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49583/">CVE-2022-49583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49583">CVE-2022-49583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49585/">CVE-2022-49585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49585">CVE-2022-49585 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49586/">CVE-2022-49586 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49586">CVE-2022-49586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49587/">CVE-2022-49587 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49587">CVE-2022-49587 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49588/">CVE-2022-49588 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49588">CVE-2022-49588 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49589/">CVE-2022-49589 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49589">CVE-2022-49589 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49590/">CVE-2022-49590 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49590">CVE-2022-49590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49592/">CVE-2022-49592 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49592">CVE-2022-49592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49593/">CVE-2022-49593 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49593">CVE-2022-49593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49594/">CVE-2022-49594 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49594">CVE-2022-49594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49595/">CVE-2022-49595 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49595">CVE-2022-49595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49596/">CVE-2022-49596 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49596">CVE-2022-49596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49598/">CVE-2022-49598 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49598">CVE-2022-49598 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49599/">CVE-2022-49599 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49599">CVE-2022-49599 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49600/">CVE-2022-49600 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49600">CVE-2022-49600 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49601/">CVE-2022-49601 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49601">CVE-2022-49601 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49602/">CVE-2022-49602 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49602">CVE-2022-49602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49603/">CVE-2022-49603 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49603">CVE-2022-49603 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49604/">CVE-2022-49604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49604">CVE-2022-49604 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49612/">CVE-2022-49612 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49612">CVE-2022-49612 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49629/">CVE-2022-49629 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49629">CVE-2022-49629 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49630/">CVE-2022-49630 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49630">CVE-2022-49630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49631/">CVE-2022-49631 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49631">CVE-2022-49631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49632/">CVE-2022-49632 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49632">CVE-2022-49632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49634/">CVE-2022-49634 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49634">CVE-2022-49634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49636/">CVE-2022-49636 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49636">CVE-2022-49636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49637/">CVE-2022-49637 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49637">CVE-2022-49637 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49638/">CVE-2022-49638 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49638">CVE-2022-49638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49639/">CVE-2022-49639 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49639">CVE-2022-49639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49641/">CVE-2022-49641 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49641">CVE-2022-49641 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49642/">CVE-2022-49642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49642">CVE-2022-49642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49644/">CVE-2022-49644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49644">CVE-2022-49644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49646/">CVE-2022-49646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49646">CVE-2022-49646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49647/">CVE-2022-49647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49647">CVE-2022-49647 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49651/">CVE-2022-49651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49651">CVE-2022-49651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49655/">CVE-2022-49655 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49655">CVE-2022-49655 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49659/">CVE-2022-49659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49659">CVE-2022-49659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49666/">CVE-2022-49666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49666">CVE-2022-49666 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49688/">CVE-2022-49688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49688">CVE-2022-49688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49700/">CVE-2022-49700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49700">CVE-2022-49700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49723/">CVE-2022-49723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49723">CVE-2022-49723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49726/">CVE-2022-49726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49726">CVE-2022-49726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49739/">CVE-2022-49739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49739">CVE-2022-49739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49753/">CVE-2022-49753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49753">CVE-2022-49753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49848/">CVE-2022-49848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49848">CVE-2022-49848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49853/">CVE-2022-49853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49853">CVE-2022-49853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49862/">CVE-2022-49862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49862">CVE-2022-49862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49872/">CVE-2022-49872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49872">CVE-2022-49872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49902/">CVE-2022-49902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49902">CVE-2022-49902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49903/">CVE-2022-49903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49903">CVE-2022-49903 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49908/">CVE-2022-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49908">CVE-2022-49908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49911/">CVE-2022-49911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49911">CVE-2022-49911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49920/">CVE-2022-49920 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49920">CVE-2022-49920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49925/">CVE-2022-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49925">CVE-2022-49925 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49934/">CVE-2022-49934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49934">CVE-2022-49934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49935/">CVE-2022-49935 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49935">CVE-2022-49935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49936/">CVE-2022-49936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49936">CVE-2022-49936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49942/">CVE-2022-49942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49942">CVE-2022-49942 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49943/">CVE-2022-49943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49943">CVE-2022-49943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49944/">CVE-2022-49944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49944">CVE-2022-49944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49951/">CVE-2022-49951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49951">CVE-2022-49951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49958/">CVE-2022-49958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49958">CVE-2022-49958 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49959/">CVE-2022-49959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49959">CVE-2022-49959 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49960/">CVE-2022-49960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49960">CVE-2022-49960 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49961/">CVE-2022-49961 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49961">CVE-2022-49961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49962/">CVE-2022-49962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49962">CVE-2022-49962 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49964/">CVE-2022-49964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49964">CVE-2022-49964 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49965/">CVE-2022-49965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49965">CVE-2022-49965 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49966/">CVE-2022-49966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49966">CVE-2022-49966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49967/">CVE-2022-49967 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49967">CVE-2022-49967 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49969/">CVE-2022-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49969">CVE-2022-49969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49970/">CVE-2022-49970 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49970">CVE-2022-49970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49971/">CVE-2022-49971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49971">CVE-2022-49971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49973/">CVE-2022-49973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49973">CVE-2022-49973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49974/">CVE-2022-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49974">CVE-2022-49974 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49979/">CVE-2022-49979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49979">CVE-2022-49979 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49980/">CVE-2022-49980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49980">CVE-2022-49980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49981/">CVE-2022-49981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49981">CVE-2022-49981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49982/">CVE-2022-49982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49982">CVE-2022-49982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49983/">CVE-2022-49983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49983">CVE-2022-49983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49984/">CVE-2022-49984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49984">CVE-2022-49984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49985/">CVE-2022-49985 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49985">CVE-2022-49985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49986/">CVE-2022-49986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49986">CVE-2022-49986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49990/">CVE-2022-49990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49990">CVE-2022-49990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49991/">CVE-2022-49991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49991">CVE-2022-49991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49992/">CVE-2022-49992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49992">CVE-2022-49992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49993/">CVE-2022-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49993">CVE-2022-49993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49994/">CVE-2022-49994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49994">CVE-2022-49994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49995/">CVE-2022-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49995">CVE-2022-49995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49998/">CVE-2022-49998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49998">CVE-2022-49998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50002/">CVE-2022-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50002">CVE-2022-50002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50003/">CVE-2022-50003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50003">CVE-2022-50003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50006/">CVE-2022-50006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50006">CVE-2022-50006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50007/">CVE-2022-50007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50007">CVE-2022-50007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50014/">CVE-2022-50014 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50014">CVE-2022-50014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50015/">CVE-2022-50015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50015">CVE-2022-50015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50016/">CVE-2022-50016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50016">CVE-2022-50016 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50020/">CVE-2022-50020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50020">CVE-2022-50020 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50021/">CVE-2022-50021 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50021">CVE-2022-50021 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50022/">CVE-2022-50022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50022">CVE-2022-50022 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50028/">CVE-2022-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50028">CVE-2022-50028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50029/">CVE-2022-50029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50029">CVE-2022-50029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50032/">CVE-2022-50032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50032">CVE-2022-50032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50033/">CVE-2022-50033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50033">CVE-2022-50033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50034/">CVE-2022-50034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50034">CVE-2022-50034 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50035/">CVE-2022-50035 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50035">CVE-2022-50035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50037/">CVE-2022-50037 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50037">CVE-2022-50037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50039/">CVE-2022-50039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50039">CVE-2022-50039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50041/">CVE-2022-50041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50041">CVE-2022-50041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50044/">CVE-2022-50044 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50044">CVE-2022-50044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50046/">CVE-2022-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50046">CVE-2022-50046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50049/">CVE-2022-50049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50049">CVE-2022-50049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50050/">CVE-2022-50050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50050">CVE-2022-50050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50051/">CVE-2022-50051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50051">CVE-2022-50051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50052/">CVE-2022-50052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50052">CVE-2022-50052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50053/">CVE-2022-50053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50053">CVE-2022-50053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50054/">CVE-2022-50054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50054">CVE-2022-50054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50055/">CVE-2022-50055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50055">CVE-2022-50055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50058/">CVE-2022-50058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50058">CVE-2022-50058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50068/">CVE-2022-50068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50068">CVE-2022-50068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50069/">CVE-2022-50069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50069">CVE-2022-50069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50070/">CVE-2022-50070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50070">CVE-2022-50070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50079/">CVE-2022-50079 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50079">CVE-2022-50079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-50081/">CVE-2022-50081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50081">CVE-2022-50081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50083/">CVE-2022-50083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50083">CVE-2022-50083 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50086/">CVE-2022-50086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50086">CVE-2022-50086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50088/">CVE-2022-50088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50088">CVE-2022-50088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50093/">CVE-2022-50093 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50093">CVE-2022-50093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50100/">CVE-2022-50100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50100">CVE-2022-50100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50111/">CVE-2022-50111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50111">CVE-2022-50111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50113/">CVE-2022-50113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50113">CVE-2022-50113 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50120/">CVE-2022-50120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50120">CVE-2022-50120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50122/">CVE-2022-50122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50122">CVE-2022-50122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-50123/">CVE-2022-50123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50123">CVE-2022-50123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50124/">CVE-2022-50124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50124">CVE-2022-50124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50125/">CVE-2022-50125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50125">CVE-2022-50125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50126/">CVE-2022-50126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50126">CVE-2022-50126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50129/">CVE-2022-50129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50129">CVE-2022-50129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50131/">CVE-2022-50131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50131">CVE-2022-50131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50132/">CVE-2022-50132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50132">CVE-2022-50132 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50133/">CVE-2022-50133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50133">CVE-2022-50133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50136/">CVE-2022-50136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50136">CVE-2022-50136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50137/">CVE-2022-50137 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50137">CVE-2022-50137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50138/">CVE-2022-50138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50138">CVE-2022-50138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50139/">CVE-2022-50139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50139">CVE-2022-50139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50146/">CVE-2022-50146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50146">CVE-2022-50146 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50147/">CVE-2022-50147 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50147">CVE-2022-50147 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50148/">CVE-2022-50148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50148">CVE-2022-50148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50149/">CVE-2022-50149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50149">CVE-2022-50149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50151/">CVE-2022-50151 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50151">CVE-2022-50151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50152/">CVE-2022-50152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50152">CVE-2022-50152 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50153/">CVE-2022-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50153">CVE-2022-50153 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50154/">CVE-2022-50154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50154">CVE-2022-50154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50156/">CVE-2022-50156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50156">CVE-2022-50156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50157/">CVE-2022-50157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50157">CVE-2022-50157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50164/">CVE-2022-50164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50164">CVE-2022-50164 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50166/">CVE-2022-50166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50166">CVE-2022-50166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50168/">CVE-2022-50168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50168">CVE-2022-50168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50172/">CVE-2022-50172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50172">CVE-2022-50172 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50181/">CVE-2022-50181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50181">CVE-2022-50181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50185/">CVE-2022-50185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50185">CVE-2022-50185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50189/">CVE-2022-50189 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50189">CVE-2022-50189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50190/">CVE-2022-50190 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50190">CVE-2022-50190 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50194/">CVE-2022-50194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50194">CVE-2022-50194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50196/">CVE-2022-50196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50196">CVE-2022-50196 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50206/">CVE-2022-50206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50206">CVE-2022-50206 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50211/">CVE-2022-50211 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50211">CVE-2022-50211 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50215/">CVE-2022-50215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50215">CVE-2022-50215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50219/">CVE-2022-50219 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50219">CVE-2022-50219 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50221/">CVE-2022-50221 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50221">CVE-2022-50221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50224/">CVE-2022-50224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50224">CVE-2022-50224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50226/">CVE-2022-50226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50226">CVE-2022-50226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50227/">CVE-2022-50227 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50227">CVE-2022-50227 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50228/">CVE-2022-50228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50228">CVE-2022-50228 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50229/">CVE-2022-50229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50229">CVE-2022-50229 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50235/">CVE-2022-50235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50235">CVE-2022-50235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50241/">CVE-2022-50241 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50241">CVE-2022-50241 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50243/">CVE-2022-50243 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50243">CVE-2022-50243 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50263/">CVE-2022-50263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50263">CVE-2022-50263 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50271/">CVE-2022-50271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50271">CVE-2022-50271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50285/">CVE-2022-50285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50285">CVE-2022-50285 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50299/">CVE-2022-50299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50299">CVE-2022-50299 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50302/">CVE-2022-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50302">CVE-2022-50302 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50306/">CVE-2022-50306 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50306">CVE-2022-50306 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50308/">CVE-2022-50308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50308">CVE-2022-50308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50318/">CVE-2022-50318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50318">CVE-2022-50318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50325/">CVE-2022-50325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50325">CVE-2022-50325 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50326/">CVE-2022-50326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50326">CVE-2022-50326 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50344/">CVE-2022-50344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50344">CVE-2022-50344 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50348/">CVE-2022-50348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50348">CVE-2022-50348 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50350/">CVE-2022-50350 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50350">CVE-2022-50350 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50363/">CVE-2022-50363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50363">CVE-2022-50363 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50381/">CVE-2022-50381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50381">CVE-2022-50381 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50385/">CVE-2022-50385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50385">CVE-2022-50385 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50388/">CVE-2022-50388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50388">CVE-2022-50388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50392/">CVE-2022-50392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50392">CVE-2022-50392 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50396/">CVE-2022-50396 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50396">CVE-2022-50396 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50402/">CVE-2022-50402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50402">CVE-2022-50402 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50403/">CVE-2022-50403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50403">CVE-2022-50403 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50405/">CVE-2022-50405 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50405">CVE-2022-50405 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50408/">CVE-2022-50408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50408">CVE-2022-50408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50410/">CVE-2022-50410 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50410">CVE-2022-50410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50418/">CVE-2022-50418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50418">CVE-2022-50418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50425/">CVE-2022-50425 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50425">CVE-2022-50425 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50427/">CVE-2022-50427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50427">CVE-2022-50427 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50431/">CVE-2022-50431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50431">CVE-2022-50431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50436/">CVE-2022-50436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50436">CVE-2022-50436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50439/">CVE-2022-50439 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50439">CVE-2022-50439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50452/">CVE-2022-50452 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50452">CVE-2022-50452 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50459/">CVE-2022-50459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50459">CVE-2022-50459 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50465/">CVE-2022-50465 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50465">CVE-2022-50465 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50467/">CVE-2022-50467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50467">CVE-2022-50467 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50484/">CVE-2022-50484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50484">CVE-2022-50484 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50487/">CVE-2022-50487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50487">CVE-2022-50487 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50496/">CVE-2022-50496 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50496">CVE-2022-50496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50506/">CVE-2022-50506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50506">CVE-2022-50506 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50512/">CVE-2022-50512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50512">CVE-2022-50512 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50516/">CVE-2022-50516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50516">CVE-2022-50516 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50530/">CVE-2022-50530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50530">CVE-2022-50530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50531/">CVE-2022-50531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50531">CVE-2022-50531 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50534/">CVE-2022-50534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50534">CVE-2022-50534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50546/">CVE-2022-50546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50546">CVE-2022-50546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50549/">CVE-2022-50549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50549">CVE-2022-50549 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50554/">CVE-2022-50554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50554">CVE-2022-50554 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50555/">CVE-2022-50555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50555">CVE-2022-50555 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50563/">CVE-2022-50563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50563">CVE-2022-50563 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50569/">CVE-2022-50569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50569">CVE-2022-50569 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50580/">CVE-2022-50580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50580">CVE-2022-50580 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-50583/">CVE-2022-50583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50583">CVE-2022-50583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50615/">CVE-2022-50615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50615">CVE-2022-50615 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50622/">CVE-2022-50622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50622">CVE-2022-50622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50635/">CVE-2022-50635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50635">CVE-2022-50635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50668/">CVE-2022-50668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50668">CVE-2022-50668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50678/">CVE-2022-50678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50678">CVE-2022-50678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50679/">CVE-2022-50679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50679">CVE-2022-50679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50698/">CVE-2022-50698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50698">CVE-2022-50698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50702/">CVE-2022-50702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50702">CVE-2022-50702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50703/">CVE-2022-50703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50703">CVE-2022-50703 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50714/">CVE-2022-50714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50714">CVE-2022-50714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50715/">CVE-2022-50715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50715">CVE-2022-50715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50717/">CVE-2022-50717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50717">CVE-2022-50717 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50723/">CVE-2022-50723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50723">CVE-2022-50723 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50726/">CVE-2022-50726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50726">CVE-2022-50726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50730/">CVE-2022-50730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50730">CVE-2022-50730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50738/">CVE-2022-50738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50738">CVE-2022-50738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50744/">CVE-2022-50744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50744">CVE-2022-50744 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50752/">CVE-2022-50752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50752">CVE-2022-50752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50768/">CVE-2022-50768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50768">CVE-2022-50768 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50773/">CVE-2022-50773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50773">CVE-2022-50773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50778/">CVE-2022-50778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50778">CVE-2022-50778 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50783/">CVE-2022-50783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50783">CVE-2022-50783 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50816/">CVE-2022-50816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50816">CVE-2022-50816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50833/">CVE-2022-50833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50833">CVE-2022-50833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50835/">CVE-2022-50835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50835">CVE-2022-50835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50839/">CVE-2022-50839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50839">CVE-2022-50839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50843/">CVE-2022-50843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50843">CVE-2022-50843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50855/">CVE-2022-50855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50855">CVE-2022-50855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50861/">CVE-2022-50861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50861">CVE-2022-50861 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50863/">CVE-2022-50863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50863">CVE-2022-50863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50866/">CVE-2022-50866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50866">CVE-2022-50866 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50889/">CVE-2022-50889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50889">CVE-2022-50889 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0394/">CVE-2023-0394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0461/">CVE-2023-0461 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0461">CVE-2023-0461 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0590/">CVE-2023-0590 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0590">CVE-2023-0590 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1195/">CVE-2023-1195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1195">CVE-2023-1195 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1382/">CVE-2023-1382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1382">CVE-2023-1382 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2177/">CVE-2023-2177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22998/">CVE-2023-22998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22998">CVE-2023-22998 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2513/">CVE-2023-2513 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52340/">CVE-2023-52340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52340">CVE-2023-52340 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52905/">CVE-2023-52905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52905">CVE-2023-52905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53020/">CVE-2023-53020 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53020">CVE-2023-53020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53021/">CVE-2023-53021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53021">CVE-2023-53021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53029/">CVE-2023-53029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53029">CVE-2023-53029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53030/">CVE-2023-53030 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53030">CVE-2023-53030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53033/">CVE-2023-53033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53033">CVE-2023-53033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53064/">CVE-2023-53064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53064">CVE-2023-53064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53083/">CVE-2023-53083 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53083">CVE-2023-53083 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53273/">CVE-2023-53273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53273">CVE-2023-53273 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53381/">CVE-2023-53381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53381">CVE-2023-53381 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53393/">CVE-2023-53393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53393">CVE-2023-53393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53552/">CVE-2023-53552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53552">CVE-2023-53552 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53606/">CVE-2023-53606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53606">CVE-2023-53606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53634/">CVE-2023-53634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53634">CVE-2023-53634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53765/">CVE-2023-53765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53765">CVE-2023-53765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53809/">CVE-2023-53809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53809">CVE-2023-53809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53811/">CVE-2023-53811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53811">CVE-2023-53811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21867/">CVE-2025-21867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21867">CVE-2025-21867 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38393/">CVE-2025-38393 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38393">CVE-2025-38393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3835" version="1" class="patch">
	<metadata>
		<title>security update for device-mapper-multipath (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41973" ref_url="https://www.suse.com/security/cve/CVE-2022-41973/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2459.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2459.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41973/">CVE-2022-41973 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41973">CVE-2022-41973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805898" comment="device-mapper-multipath-0.8.7-20.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805899" comment="device-mapper-multipath-devel-0.8.7-20.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805900" comment="device-mapper-multipath-libs-0.8.7-20.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805901" comment="kpartx-0.8.7-20.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3836" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-35252" ref_url="https://www.suse.com/security/cve/CVE-2022-35252/" source="CVE"/>
		<reference ref_id="CVE-2022-43552" ref_url="https://www.suse.com/security/cve/CVE-2022-43552/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2478.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2478.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35252/">CVE-2022-35252 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35252">CVE-2022-35252 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-43552/">CVE-2022-43552 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43552">CVE-2022-43552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805902" comment="curl-7.76.1-23.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805903" comment="curl-minimal-7.76.1-23.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805904" comment="libcurl-7.76.1-23.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805905" comment="libcurl-devel-7.76.1-23.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805906" comment="libcurl-minimal-7.76.1-23.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3837" version="1" class="patch">
	<metadata>
		<title>security update for fwupd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3287" ref_url="https://www.suse.com/security/cve/CVE-2022-3287/" source="CVE"/>
		<reference ref_id="CVE-2022-34301" ref_url="https://www.suse.com/security/cve/CVE-2022-34301/" source="CVE"/>
		<reference ref_id="CVE-2022-34302" ref_url="https://www.suse.com/security/cve/CVE-2022-34302/" source="CVE"/>
		<reference ref_id="CVE-2022-34303" ref_url="https://www.suse.com/security/cve/CVE-2022-34303/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2487.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2487.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3287/">CVE-2022-3287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3287">CVE-2022-3287 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34301/">CVE-2022-34301 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34301">CVE-2022-34301 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34302/">CVE-2022-34302 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34302">CVE-2022-34302 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34303/">CVE-2022-34303 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34303">CVE-2022-34303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805907" comment="fwupd-1.8.10-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805908" comment="fwupd-devel-1.8.10-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805909" comment="fwupd-plugin-flashrom-1.8.10-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3838" version="1" class="patch">
	<metadata>
		<title>security update for dhcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2928" ref_url="https://www.suse.com/security/cve/CVE-2022-2928/" source="CVE"/>
		<reference ref_id="CVE-2022-2929" ref_url="https://www.suse.com/security/cve/CVE-2022-2929/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2502.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2502.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2928/">CVE-2022-2928 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2928">CVE-2022-2928 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2929/">CVE-2022-2929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2929">CVE-2022-2929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805910" comment="dhcp-client-4.4.2-18.b1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805911" comment="dhcp-common-4.4.2-18.b1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805912" comment="dhcp-relay-4.4.2-18.b1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805913" comment="dhcp-server-4.4.2-18.b1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3839" version="1" class="patch">
	<metadata>
		<title>security update for samba (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1615" ref_url="https://www.suse.com/security/cve/CVE-2022-1615/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2519.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2519.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1615/">CVE-2022-1615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1615">CVE-2022-1615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981840" comment="ctdb-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805914" comment="evolution-mapi-3.40.1-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805915" comment="evolution-mapi-langpacks-3.40.1-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805916" comment="libnetapi-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981841" comment="libnetapi-devel-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805917" comment="libsmbclient-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981842" comment="libsmbclient-devel-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805918" comment="libwbclient-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981843" comment="libwbclient-devel-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805919" comment="openchange-2.3-40.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805920" comment="python3-samba-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805921" comment="python3-samba-dc-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981844" comment="python3-samba-devel-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981845" comment="python3-samba-test-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805922" comment="samba-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805923" comment="samba-client-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805924" comment="samba-client-libs-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805925" comment="samba-common-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805926" comment="samba-common-libs-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805927" comment="samba-common-tools-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805928" comment="samba-dc-libs-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805929" comment="samba-dcerpc-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981846" comment="samba-devel-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805930" comment="samba-krb5-printing-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805931" comment="samba-ldb-ldap-modules-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805932" comment="samba-libs-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981847" comment="samba-pidl-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981848" comment="samba-test-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981849" comment="samba-test-libs-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805933" comment="samba-tools-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805934" comment="samba-usershares-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805935" comment="samba-vfs-iouring-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805936" comment="samba-winbind-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805937" comment="samba-winbind-clients-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805938" comment="samba-winbind-krb5-locator-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805939" comment="samba-winbind-modules-4.17.5-102.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805940" comment="samba-winexe-4.17.5-102.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3840" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3358" ref_url="https://www.suse.com/security/cve/CVE-2022-3358/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2523.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2523.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3358/">CVE-2022-3358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3358">CVE-2022-3358 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805941" comment="openssl-3.0.7-6.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805942" comment="openssl-devel-3.0.7-6.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805943" comment="openssl-libs-3.0.7-6.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805944" comment="openssl-perl-3.0.7-6.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3841" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-36227" ref_url="https://www.suse.com/security/cve/CVE-2022-36227/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2532.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2532.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-36227/">CVE-2022-36227 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36227">CVE-2022-36227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805945" comment="bsdtar-3.5.3-4.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805946" comment="libarchive-3.5.3-4.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805947" comment="libarchive-devel-3.5.3-4.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3842" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-17049" ref_url="https://www.suse.com/security/cve/CVE-2020-17049/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2570.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2570.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-17049/">CVE-2020-17049 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17049">CVE-2020-17049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805948" comment="krb5-devel-1.20.1-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805949" comment="krb5-libs-1.20.1-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805950" comment="krb5-pkinit-1.20.1-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805951" comment="krb5-server-1.20.1-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805952" comment="krb5-server-ldap-1.20.1-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805953" comment="krb5-workstation-1.20.1-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805954" comment="libkadm5-1.20.1-8.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3843" version="1" class="patch">
	<metadata>
		<title>security update for lua (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-28805" ref_url="https://www.suse.com/security/cve/CVE-2022-28805/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2582.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2582.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28805/">CVE-2022-28805 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28805">CVE-2022-28805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805955" comment="lua-5.4.4-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805956" comment="lua-devel-5.4.4-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805957" comment="lua-libs-5.4.4-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3844" version="1" class="patch">
	<metadata>
		<title>security update for autotrace (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-32323" ref_url="https://www.suse.com/security/cve/CVE-2022-32323/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2589.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2589.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32323/">CVE-2022-32323 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32323">CVE-2022-32323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811010" comment="autotrace-0.31.1-65.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3845" version="1" class="patch">
	<metadata>
		<title>security update for golang-github-cpuguy83-md2man (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2592.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2592.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811011" comment="golang-github-cpuguy83-md2man-2.0.2-4.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3846" version="1" class="patch">
	<metadata>
		<title>security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-21594" ref_url="https://www.suse.com/security/cve/CVE-2022-21594/" source="CVE"/>
		<reference ref_id="CVE-2022-21599" ref_url="https://www.suse.com/security/cve/CVE-2022-21599/" source="CVE"/>
		<reference ref_id="CVE-2022-21604" ref_url="https://www.suse.com/security/cve/CVE-2022-21604/" source="CVE"/>
		<reference ref_id="CVE-2022-21608" ref_url="https://www.suse.com/security/cve/CVE-2022-21608/" source="CVE"/>
		<reference ref_id="CVE-2022-21611" ref_url="https://www.suse.com/security/cve/CVE-2022-21611/" source="CVE"/>
		<reference ref_id="CVE-2022-21617" ref_url="https://www.suse.com/security/cve/CVE-2022-21617/" source="CVE"/>
		<reference ref_id="CVE-2022-21625" ref_url="https://www.suse.com/security/cve/CVE-2022-21625/" source="CVE"/>
		<reference ref_id="CVE-2022-21632" ref_url="https://www.suse.com/security/cve/CVE-2022-21632/" source="CVE"/>
		<reference ref_id="CVE-2022-21633" ref_url="https://www.suse.com/security/cve/CVE-2022-21633/" source="CVE"/>
		<reference ref_id="CVE-2022-21637" ref_url="https://www.suse.com/security/cve/CVE-2022-21637/" source="CVE"/>
		<reference ref_id="CVE-2022-21640" ref_url="https://www.suse.com/security/cve/CVE-2022-21640/" source="CVE"/>
		<reference ref_id="CVE-2022-39400" ref_url="https://www.suse.com/security/cve/CVE-2022-39400/" source="CVE"/>
		<reference ref_id="CVE-2022-39408" ref_url="https://www.suse.com/security/cve/CVE-2022-39408/" source="CVE"/>
		<reference ref_id="CVE-2022-39410" ref_url="https://www.suse.com/security/cve/CVE-2022-39410/" source="CVE"/>
		<reference ref_id="CVE-2023-21836" ref_url="https://www.suse.com/security/cve/CVE-2023-21836/" source="CVE"/>
		<reference ref_id="CVE-2023-21863" ref_url="https://www.suse.com/security/cve/CVE-2023-21863/" source="CVE"/>
		<reference ref_id="CVE-2023-21864" ref_url="https://www.suse.com/security/cve/CVE-2023-21864/" source="CVE"/>
		<reference ref_id="CVE-2023-21865" ref_url="https://www.suse.com/security/cve/CVE-2023-21865/" source="CVE"/>
		<reference ref_id="CVE-2023-21867" ref_url="https://www.suse.com/security/cve/CVE-2023-21867/" source="CVE"/>
		<reference ref_id="CVE-2023-21868" ref_url="https://www.suse.com/security/cve/CVE-2023-21868/" source="CVE"/>
		<reference ref_id="CVE-2023-21869" ref_url="https://www.suse.com/security/cve/CVE-2023-21869/" source="CVE"/>
		<reference ref_id="CVE-2023-21870" ref_url="https://www.suse.com/security/cve/CVE-2023-21870/" source="CVE"/>
		<reference ref_id="CVE-2023-21871" ref_url="https://www.suse.com/security/cve/CVE-2023-21871/" source="CVE"/>
		<reference ref_id="CVE-2023-21873" ref_url="https://www.suse.com/security/cve/CVE-2023-21873/" source="CVE"/>
		<reference ref_id="CVE-2023-21874" ref_url="https://www.suse.com/security/cve/CVE-2023-21874/" source="CVE"/>
		<reference ref_id="CVE-2023-21875" ref_url="https://www.suse.com/security/cve/CVE-2023-21875/" source="CVE"/>
		<reference ref_id="CVE-2023-21876" ref_url="https://www.suse.com/security/cve/CVE-2023-21876/" source="CVE"/>
		<reference ref_id="CVE-2023-21877" ref_url="https://www.suse.com/security/cve/CVE-2023-21877/" source="CVE"/>
		<reference ref_id="CVE-2023-21878" ref_url="https://www.suse.com/security/cve/CVE-2023-21878/" source="CVE"/>
		<reference ref_id="CVE-2023-21879" ref_url="https://www.suse.com/security/cve/CVE-2023-21879/" source="CVE"/>
		<reference ref_id="CVE-2023-21880" ref_url="https://www.suse.com/security/cve/CVE-2023-21880/" source="CVE"/>
		<reference ref_id="CVE-2023-21881" ref_url="https://www.suse.com/security/cve/CVE-2023-21881/" source="CVE"/>
		<reference ref_id="CVE-2023-21882" ref_url="https://www.suse.com/security/cve/CVE-2023-21882/" source="CVE"/>
		<reference ref_id="CVE-2023-21883" ref_url="https://www.suse.com/security/cve/CVE-2023-21883/" source="CVE"/>
		<reference ref_id="CVE-2023-21887" ref_url="https://www.suse.com/security/cve/CVE-2023-21887/" source="CVE"/>
		<reference ref_id="CVE-2023-21912" ref_url="https://www.suse.com/security/cve/CVE-2023-21912/" source="CVE"/>
		<reference ref_id="CVE-2023-21913" ref_url="https://www.suse.com/security/cve/CVE-2023-21913/" source="CVE"/>
		<reference ref_id="CVE-2023-21917" ref_url="https://www.suse.com/security/cve/CVE-2023-21917/" source="CVE"/>
		<reference ref_id="CVE-2023-21963" ref_url="https://www.suse.com/security/cve/CVE-2023-21963/" source="CVE"/>
		<reference ref_id="CVE-2023-22015" ref_url="https://www.suse.com/security/cve/CVE-2023-22015/" source="CVE"/>
		<reference ref_id="CVE-2023-22026" ref_url="https://www.suse.com/security/cve/CVE-2023-22026/" source="CVE"/>
		<reference ref_id="CVE-2023-22028" ref_url="https://www.suse.com/security/cve/CVE-2023-22028/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2621.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2621.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21594/">CVE-2022-21594 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21594">CVE-2022-21594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21599/">CVE-2022-21599 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21599">CVE-2022-21599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21604/">CVE-2022-21604 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21604">CVE-2022-21604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21608/">CVE-2022-21608 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21608">CVE-2022-21608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21611/">CVE-2022-21611 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21611">CVE-2022-21611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21617/">CVE-2022-21617 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21617">CVE-2022-21617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21625/">CVE-2022-21625 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21625">CVE-2022-21625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21632/">CVE-2022-21632 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21632">CVE-2022-21632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21633/">CVE-2022-21633 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21633">CVE-2022-21633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21637/">CVE-2022-21637 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21637">CVE-2022-21637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21640/">CVE-2022-21640 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21640">CVE-2022-21640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39400/">CVE-2022-39400 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39400">CVE-2022-39400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39408/">CVE-2022-39408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39408">CVE-2022-39408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39410/">CVE-2022-39410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39410">CVE-2022-39410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21836/">CVE-2023-21836 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21836">CVE-2023-21836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21863/">CVE-2023-21863 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21863">CVE-2023-21863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21864/">CVE-2023-21864 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21864">CVE-2023-21864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21865/">CVE-2023-21865 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21865">CVE-2023-21865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21867/">CVE-2023-21867 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21867">CVE-2023-21867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21868/">CVE-2023-21868 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21868">CVE-2023-21868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21869/">CVE-2023-21869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21869">CVE-2023-21869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21870/">CVE-2023-21870 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21870">CVE-2023-21870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21871/">CVE-2023-21871 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21871">CVE-2023-21871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21873/">CVE-2023-21873 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21873">CVE-2023-21873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21874/">CVE-2023-21874 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21874">CVE-2023-21874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21875/">CVE-2023-21875 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21875">CVE-2023-21875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21876/">CVE-2023-21876 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21876">CVE-2023-21876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21877/">CVE-2023-21877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21877">CVE-2023-21877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21878/">CVE-2023-21878 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21878">CVE-2023-21878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21879/">CVE-2023-21879 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21879">CVE-2023-21879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21880/">CVE-2023-21880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21880">CVE-2023-21880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21881/">CVE-2023-21881 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21881">CVE-2023-21881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21882/">CVE-2023-21882 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21882">CVE-2023-21882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21883/">CVE-2023-21883 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21883">CVE-2023-21883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21887/">CVE-2023-21887 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21887">CVE-2023-21887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21912/">CVE-2023-21912 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21912">CVE-2023-21912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21913/">CVE-2023-21913 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21913">CVE-2023-21913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21917/">CVE-2023-21917 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21917">CVE-2023-21917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21963/">CVE-2023-21963 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21963">CVE-2023-21963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22015/">CVE-2023-22015 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22015">CVE-2023-22015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22026/">CVE-2023-22026 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22026">CVE-2023-22026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22028/">CVE-2023-22028 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22028">CVE-2023-22028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3847" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-48337" ref_url="https://www.suse.com/security/cve/CVE-2022-48337/" source="CVE"/>
		<reference ref_id="CVE-2022-48338" ref_url="https://www.suse.com/security/cve/CVE-2022-48338/" source="CVE"/>
		<reference ref_id="CVE-2022-48339" ref_url="https://www.suse.com/security/cve/CVE-2022-48339/" source="CVE"/>
		<reference ref_id="CVE-2023-2491" ref_url="https://www.suse.com/security/cve/CVE-2023-2491/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2626.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2626.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48337/">CVE-2022-48337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48337">CVE-2022-48337 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48338/">CVE-2022-48338 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48338">CVE-2022-48338 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48339/">CVE-2022-48339 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48339">CVE-2022-48339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2491/">CVE-2023-2491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2491">CVE-2023-2491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805965" comment="emacs-27.2-8.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805966" comment="emacs-common-27.2-8.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805967" comment="emacs-filesystem-27.2-8.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805968" comment="emacs-lucid-27.2-8.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805969" comment="emacs-nox-27.2-8.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3848" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-23009" ref_url="https://www.suse.com/security/cve/CVE-2023-23009/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2633.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2633.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23009/">CVE-2023-23009 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23009">CVE-2023-23009 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805970" comment="libreswan-4.9-2.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3849" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-25136" ref_url="https://www.suse.com/security/cve/CVE-2023-25136/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2645.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2645.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25136/">CVE-2023-25136 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25136">CVE-2023-25136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805971" comment="openssh-8.7p1-29.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805972" comment="openssh-askpass-8.7p1-29.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805973" comment="openssh-clients-8.7p1-29.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805974" comment="openssh-keycat-8.7p1-29.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805975" comment="openssh-server-8.7p1-29.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805976" comment="pam_ssh_agent_auth-0.10.4-5.29.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3850" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-27535" ref_url="https://www.suse.com/security/cve/CVE-2023-27535/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2650.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2650.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27535/">CVE-2023-27535 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27535">CVE-2023-27535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805977" comment="curl-7.76.1-23.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805978" comment="curl-minimal-7.76.1-23.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805979" comment="libcurl-7.76.1-23.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805980" comment="libcurl-devel-7.76.1-23.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805981" comment="libcurl-minimal-7.76.1-23.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3851" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-2319" ref_url="https://www.suse.com/security/cve/CVE-2023-2319/" source="CVE"/>
		<reference ref_id="CVE-2023-27530" ref_url="https://www.suse.com/security/cve/CVE-2023-27530/" source="CVE"/>
		<reference ref_id="CVE-2023-27539" ref_url="https://www.suse.com/security/cve/CVE-2023-27539/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2652.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2652.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2319/">CVE-2023-2319 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2319">CVE-2023-2319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27530/">CVE-2023-27530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27530">CVE-2023-27530 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-27539/">CVE-2023-27539 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27539">CVE-2023-27539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805982" comment="pcs-0.11.4-7.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805983" comment="pcs-snmp-0.11.4-7.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3852" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-2203" ref_url="https://www.suse.com/security/cve/CVE-2023-2203/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2653.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2653.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2203/">CVE-2023-2203 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2203">CVE-2023-2203 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805984" comment="webkit2gtk3-2.38.5-1.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805985" comment="webkit2gtk3-devel-2.38.5-1.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805986" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805987" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3853" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-35065" ref_url="https://www.suse.com/security/cve/CVE-2021-35065/" source="CVE"/>
		<reference ref_id="CVE-2022-25881" ref_url="https://www.suse.com/security/cve/CVE-2022-25881/" source="CVE"/>
		<reference ref_id="CVE-2022-4904" ref_url="https://www.suse.com/security/cve/CVE-2022-4904/" source="CVE"/>
		<reference ref_id="CVE-2023-23918" ref_url="https://www.suse.com/security/cve/CVE-2023-23918/" source="CVE"/>
		<reference ref_id="CVE-2023-23919" ref_url="https://www.suse.com/security/cve/CVE-2023-23919/" source="CVE"/>
		<reference ref_id="CVE-2023-23920" ref_url="https://www.suse.com/security/cve/CVE-2023-23920/" source="CVE"/>
		<reference ref_id="CVE-2023-23936" ref_url="https://www.suse.com/security/cve/CVE-2023-23936/" source="CVE"/>
		<reference ref_id="CVE-2023-24807" ref_url="https://www.suse.com/security/cve/CVE-2023-24807/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2654.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2654.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35065/">CVE-2021-35065 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35065">CVE-2021-35065 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25881/">CVE-2022-25881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25881">CVE-2022-25881 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-4904/">CVE-2022-4904 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23918/">CVE-2023-23918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23918">CVE-2023-23918 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23919/">CVE-2023-23919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23919">CVE-2023-23919 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23920/">CVE-2023-23920 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23920">CVE-2023-23920 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23936/">CVE-2023-23936 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23936">CVE-2023-23936 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24807/">CVE-2023-24807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24807">CVE-2023-24807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805988" comment="nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805989" comment="nodejs-devel-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805990" comment="nodejs-docs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805991" comment="nodejs-full-i18n-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805992" comment="nodejs-nodemon-2.0.20-2.module+el9.2.0.z+18497+a402347c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805993" comment="npm-9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3854" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-35065" ref_url="https://www.suse.com/security/cve/CVE-2021-35065/" source="CVE"/>
		<reference ref_id="CVE-2022-25881" ref_url="https://www.suse.com/security/cve/CVE-2022-25881/" source="CVE"/>
		<reference ref_id="CVE-2022-4904" ref_url="https://www.suse.com/security/cve/CVE-2022-4904/" source="CVE"/>
		<reference ref_id="CVE-2023-23918" ref_url="https://www.suse.com/security/cve/CVE-2023-23918/" source="CVE"/>
		<reference ref_id="CVE-2023-23920" ref_url="https://www.suse.com/security/cve/CVE-2023-23920/" source="CVE"/>
		<reference ref_id="CVE-2023-23936" ref_url="https://www.suse.com/security/cve/CVE-2023-23936/" source="CVE"/>
		<reference ref_id="CVE-2023-24807" ref_url="https://www.suse.com/security/cve/CVE-2023-24807/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2655.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2655.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35065/">CVE-2021-35065 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35065">CVE-2021-35065 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25881/">CVE-2022-25881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25881">CVE-2022-25881 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-4904/">CVE-2022-4904 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23918/">CVE-2023-23918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23918">CVE-2023-23918 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23920/">CVE-2023-23920 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23920">CVE-2023-23920 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23936/">CVE-2023-23936 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23936">CVE-2023-23936 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24807/">CVE-2023-24807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24807">CVE-2023-24807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805994" comment="nodejs-16.19.1-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805995" comment="nodejs-docs-16.19.1-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805996" comment="nodejs-full-i18n-16.19.1-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805997" comment="nodejs-libs-16.19.1-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805998" comment="nodejs-nodemon-2.0.20-3.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805999" comment="npm-8.19.3-1.16.19.1.1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3855" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205/" source="CVE"/>
		<reference ref_id="CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206/" source="CVE"/>
		<reference ref_id="CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207/" source="CVE"/>
		<reference ref_id="CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211/" source="CVE"/>
		<reference ref_id="CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212/" source="CVE"/>
		<reference ref_id="CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213/" source="CVE"/>
		<reference ref_id="CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3143.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3143.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806000" comment="firefox-102.11.0-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806001" comment="firefox-x11-102.11.0-2.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3856" version="1" class="patch">
	<metadata>
		<title>security update for apr-util (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-25147" ref_url="https://www.suse.com/security/cve/CVE-2022-25147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3147.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3147.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25147/">CVE-2022-25147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25147">CVE-2022-25147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806002" comment="apr-util-1.6.1-20.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806003" comment="apr-util-bdb-1.6.1-20.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806004" comment="apr-util-devel-1.6.1-20.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806005" comment="apr-util-ldap-1.6.1-20.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806006" comment="apr-util-mysql-1.6.1-20.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806007" comment="apr-util-odbc-1.6.1-20.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806008" comment="apr-util-openssl-1.6.1-20.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806009" comment="apr-util-pgsql-1.6.1-20.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806010" comment="apr-util-sqlite-1.6.1-20.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3857" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-2295" ref_url="https://www.suse.com/security/cve/CVE-2023-2295/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3148.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3148.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2295/">CVE-2023-2295 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2295">CVE-2023-2295 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806011" comment="libreswan-4.9-4.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3858" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205/" source="CVE"/>
		<reference ref_id="CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206/" source="CVE"/>
		<reference ref_id="CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207/" source="CVE"/>
		<reference ref_id="CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211/" source="CVE"/>
		<reference ref_id="CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212/" source="CVE"/>
		<reference ref_id="CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213/" source="CVE"/>
		<reference ref_id="CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3150.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3150.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806012" comment="thunderbird-102.11.0-1.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3859" version="1" class="patch">
	<metadata>
		<title>security update for git (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-22490" ref_url="https://www.suse.com/security/cve/CVE-2023-22490/" source="CVE"/>
		<reference ref_id="CVE-2023-23946" ref_url="https://www.suse.com/security/cve/CVE-2023-23946/" source="CVE"/>
		<reference ref_id="CVE-2023-25652" ref_url="https://www.suse.com/security/cve/CVE-2023-25652/" source="CVE"/>
		<reference ref_id="CVE-2023-25815" ref_url="https://www.suse.com/security/cve/CVE-2023-25815/" source="CVE"/>
		<reference ref_id="CVE-2023-29007" ref_url="https://www.suse.com/security/cve/CVE-2023-29007/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3245.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3245.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22490/">CVE-2023-22490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22490">CVE-2023-22490 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23946/">CVE-2023-23946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23946">CVE-2023-23946 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25652/">CVE-2023-25652 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25652">CVE-2023-25652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-25815/">CVE-2023-25815 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25815">CVE-2023-25815 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-29007/">CVE-2023-29007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29007">CVE-2023-29007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806013" comment="git-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806014" comment="git-all-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806015" comment="git-core-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806016" comment="git-core-doc-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806017" comment="git-credential-libsecret-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806018" comment="git-daemon-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806019" comment="git-email-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806020" comment="git-gui-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806021" comment="git-instaweb-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806022" comment="git-subtree-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806023" comment="git-svn-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806024" comment="gitk-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806025" comment="gitweb-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806026" comment="perl-Git-2.39.3-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806027" comment="perl-Git-SVN-2.39.3-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3860" version="1" class="patch">
	<metadata>
		<title>security update for go-toolset (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-24532" ref_url="https://www.suse.com/security/cve/CVE-2023-24532/" source="CVE"/>
		<reference ref_id="CVE-2023-24534" ref_url="https://www.suse.com/security/cve/CVE-2023-24534/" source="CVE"/>
		<reference ref_id="CVE-2023-24536" ref_url="https://www.suse.com/security/cve/CVE-2023-24536/" source="CVE"/>
		<reference ref_id="CVE-2023-24537" ref_url="https://www.suse.com/security/cve/CVE-2023-24537/" source="CVE"/>
		<reference ref_id="CVE-2023-24538" ref_url="https://www.suse.com/security/cve/CVE-2023-24538/" source="CVE"/>
		<reference ref_id="CVE-2023-24539" ref_url="https://www.suse.com/security/cve/CVE-2023-24539/" source="CVE"/>
		<reference ref_id="CVE-2023-24540" ref_url="https://www.suse.com/security/cve/CVE-2023-24540/" source="CVE"/>
		<reference ref_id="CVE-2023-29400" ref_url="https://www.suse.com/security/cve/CVE-2023-29400/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3318.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3318.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24532/">CVE-2023-24532 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24532">CVE-2023-24532 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24534/">CVE-2023-24534 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24536/">CVE-2023-24536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24537/">CVE-2023-24537 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24538/">CVE-2023-24538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24539/">CVE-2023-24539 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-24540/">CVE-2023-24540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-29400/">CVE-2023-29400 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806028" comment="go-toolset-1.19.9-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806029" comment="golang-1.19.9-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806030" comment="golang-bin-1.19.9-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806031" comment="golang-docs-1.19.9-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806032" comment="golang-misc-1.19.9-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806033" comment="golang-race-1.19.9-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806034" comment="golang-src-1.19.9-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806035" comment="golang-tests-1.19.9-2.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3861" version="1" class="patch">
	<metadata>
		<title>security update for cups-filters (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-24805" ref_url="https://www.suse.com/security/cve/CVE-2023-24805/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3423.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3423.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24805/">CVE-2023-24805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24805">CVE-2023-24805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806036" comment="cups-filters-1.28.7-11.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806037" comment="cups-filters-devel-1.28.7-11.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806038" comment="cups-filters-libs-1.28.7-11.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3862" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-28204" ref_url="https://www.suse.com/security/cve/CVE-2023-28204/" source="CVE"/>
		<reference ref_id="CVE-2023-32373" ref_url="https://www.suse.com/security/cve/CVE-2023-32373/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3432.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3432.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28204/">CVE-2023-28204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28204">CVE-2023-28204 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32373/">CVE-2023-32373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32373">CVE-2023-32373 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806039" comment="webkit2gtk3-2.38.5-1.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806040" comment="webkit2gtk3-devel-2.38.5-1.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806041" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806042" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3863" version="1" class="patch">
	<metadata>
		<title>security update for c-ares (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3559.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3559.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806043" comment="c-ares-1.17.1-5.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806044" comment="c-ares-devel-1.17.1-5.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3864" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-31124" ref_url="https://www.suse.com/security/cve/CVE-2023-31124/" source="CVE"/>
		<reference ref_id="CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130/" source="CVE"/>
		<reference ref_id="CVE-2023-31147" ref_url="https://www.suse.com/security/cve/CVE-2023-31147/" source="CVE"/>
		<reference ref_id="CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3577.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3577.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-31124/">CVE-2023-31124 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31147/">CVE-2023-31147 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806045" comment="nodejs-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806046" comment="nodejs-devel-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806047" comment="nodejs-docs-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806048" comment="nodejs-full-i18n-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805992" comment="nodejs-nodemon-2.0.20-2.module+el9.2.0.z+18497+a402347c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806049" comment="npm-9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3865" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-24936" ref_url="https://www.suse.com/security/cve/CVE-2023-24936/" source="CVE"/>
		<reference ref_id="CVE-2023-29331" ref_url="https://www.suse.com/security/cve/CVE-2023-29331/" source="CVE"/>
		<reference ref_id="CVE-2023-29337" ref_url="https://www.suse.com/security/cve/CVE-2023-29337/" source="CVE"/>
		<reference ref_id="CVE-2023-33128" ref_url="https://www.suse.com/security/cve/CVE-2023-33128/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3581.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3581.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-24936/">CVE-2023-24936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24936">CVE-2023-24936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29331/">CVE-2023-29331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29331">CVE-2023-29331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29337/">CVE-2023-29337 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29337">CVE-2023-29337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33128/">CVE-2023-33128 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33128">CVE-2023-33128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806050" comment="aspnetcore-runtime-6.0-6.0.18-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806051" comment="aspnetcore-targeting-pack-6.0-6.0.18-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806052" comment="dotnet-apphost-pack-6.0-6.0.18-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806053" comment="dotnet-hostfxr-6.0-6.0.18-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806054" comment="dotnet-runtime-6.0-6.0.18-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806055" comment="dotnet-sdk-6.0-6.0.118-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806056" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806057" comment="dotnet-targeting-pack-6.0-6.0.18-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806058" comment="dotnet-templates-6.0-6.0.118-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3866" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3585.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3585.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806059" comment="python3.11-3.11.2-2.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806060" comment="python3.11-debug-3.11.2-2.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806061" comment="python3.11-devel-3.11.2-2.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806062" comment="python3.11-idle-3.11.2-2.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806063" comment="python3.11-libs-3.11.2-2.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806064" comment="python3.11-test-3.11.2-2.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806065" comment="python3.11-tkinter-3.11.2-2.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3867" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-31124" ref_url="https://www.suse.com/security/cve/CVE-2023-31124/" source="CVE"/>
		<reference ref_id="CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130/" source="CVE"/>
		<reference ref_id="CVE-2023-31147" ref_url="https://www.suse.com/security/cve/CVE-2023-31147/" source="CVE"/>
		<reference ref_id="CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3586.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3586.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-31124/">CVE-2023-31124 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31147/">CVE-2023-31147 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806066" comment="nodejs-16.19.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806067" comment="nodejs-docs-16.19.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806068" comment="nodejs-full-i18n-16.19.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806069" comment="nodejs-libs-16.19.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806070" comment="npm-8.19.3-1.16.19.1.2.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3868" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<reference ref_id="CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3587.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3587.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806071" comment="thunderbird-102.12.0-1.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3869" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<reference ref_id="CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3589.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3589.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806072" comment="firefox-102.12.0-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806073" comment="firefox-x11-102.12.0-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3870" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-24936" ref_url="https://www.suse.com/security/cve/CVE-2023-24936/" source="CVE"/>
		<reference ref_id="CVE-2023-29331" ref_url="https://www.suse.com/security/cve/CVE-2023-29331/" source="CVE"/>
		<reference ref_id="CVE-2023-29337" ref_url="https://www.suse.com/security/cve/CVE-2023-29337/" source="CVE"/>
		<reference ref_id="CVE-2023-32032" ref_url="https://www.suse.com/security/cve/CVE-2023-32032/" source="CVE"/>
		<reference ref_id="CVE-2023-33128" ref_url="https://www.suse.com/security/cve/CVE-2023-33128/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3592.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3592.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-24936/">CVE-2023-24936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24936">CVE-2023-24936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29331/">CVE-2023-29331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29331">CVE-2023-29331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29337/">CVE-2023-29337 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29337">CVE-2023-29337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32032/">CVE-2023-32032 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32032">CVE-2023-32032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33128/">CVE-2023-33128 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33128">CVE-2023-33128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806074" comment="aspnetcore-runtime-7.0-7.0.7-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806075" comment="aspnetcore-targeting-pack-7.0-7.0.7-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806076" comment="dotnet-apphost-pack-7.0-7.0.7-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806077" comment="dotnet-host-7.0.7-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806078" comment="dotnet-hostfxr-7.0-7.0.7-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806079" comment="dotnet-runtime-7.0-7.0.7-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806080" comment="dotnet-sdk-7.0-7.0.107-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806081" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806082" comment="dotnet-targeting-pack-7.0-7.0.7-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806083" comment="dotnet-templates-7.0-7.0.107-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806084" comment="netstandard-targeting-pack-2.1-7.0.107-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3871" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3595.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3595.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806085" comment="python-unversioned-command-3.9.16-1.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806086" comment="python3-3.9.16-1.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806087" comment="python3-debug-3.9.16-1.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806088" comment="python3-devel-3.9.16-1.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806089" comment="python3-idle-3.9.16-1.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806090" comment="python3-libs-3.9.16-1.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806091" comment="python3-test-3.9.16-1.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806092" comment="python3-tkinter-3.9.16-1.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3872" version="1" class="patch">
	<metadata>
		<title>security update for texlive (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-32700" ref_url="https://www.suse.com/security/cve/CVE-2023-32700/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3661.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3661.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32700/">CVE-2023-32700 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32700">CVE-2023-32700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806093" comment="texlive-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806094" comment="texlive-adjustbox-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806095" comment="texlive-ae-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806096" comment="texlive-algorithms-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806097" comment="texlive-alphalph-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806098" comment="texlive-amscls-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806099" comment="texlive-amsfonts-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806100" comment="texlive-amsmath-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806101" comment="texlive-anyfontsize-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806102" comment="texlive-anysize-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806103" comment="texlive-appendix-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806104" comment="texlive-arabxetex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806105" comment="texlive-arphic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806106" comment="texlive-atbegshi-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806107" comment="texlive-attachfile-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806108" comment="texlive-attachfile2-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806109" comment="texlive-atveryend-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806110" comment="texlive-auxhook-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806111" comment="texlive-avantgar-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806112" comment="texlive-awesomebox-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806113" comment="texlive-babel-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806114" comment="texlive-babel-english-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806115" comment="texlive-babelbib-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806116" comment="texlive-base-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806117" comment="texlive-beamer-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806118" comment="texlive-bera-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806119" comment="texlive-beton-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806120" comment="texlive-bibtex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806121" comment="texlive-bibtopic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806122" comment="texlive-bidi-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806123" comment="texlive-bigfoot-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806124" comment="texlive-bigintcalc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806125" comment="texlive-bitset-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806126" comment="texlive-bookman-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806127" comment="texlive-bookmark-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806128" comment="texlive-booktabs-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806129" comment="texlive-breakurl-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806130" comment="texlive-breqn-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806131" comment="texlive-capt-of-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806132" comment="texlive-caption-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806133" comment="texlive-carlisle-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806134" comment="texlive-catchfile-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806135" comment="texlive-changebar-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806136" comment="texlive-changepage-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806137" comment="texlive-charter-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806138" comment="texlive-chngcntr-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806139" comment="texlive-cite-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806140" comment="texlive-cjk-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806141" comment="texlive-classpack-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806142" comment="texlive-cm-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806143" comment="texlive-cm-lgc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806144" comment="texlive-cm-super-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806145" comment="texlive-cmap-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806146" comment="texlive-cmextra-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806147" comment="texlive-cns-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806148" comment="texlive-collectbox-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806149" comment="texlive-collection-basic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806150" comment="texlive-collection-fontsrecommended-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806151" comment="texlive-collection-htmlxml-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806152" comment="texlive-collection-latex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806153" comment="texlive-collection-latexrecommended-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806154" comment="texlive-collection-xetex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806155" comment="texlive-colorprofiles-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806156" comment="texlive-colortbl-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806157" comment="texlive-context-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806158" comment="texlive-courier-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806159" comment="texlive-crop-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806160" comment="texlive-csquotes-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806161" comment="texlive-ctable-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806162" comment="texlive-ctablestack-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806163" comment="texlive-currfile-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806164" comment="texlive-datetime-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806165" comment="texlive-dehyph-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806166" comment="texlive-dvipdfmx-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806167" comment="texlive-dvipng-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806168" comment="texlive-dvips-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806169" comment="texlive-dvisvgm-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806170" comment="texlive-ec-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806171" comment="texlive-eepic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806172" comment="texlive-enctex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806173" comment="texlive-enumitem-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806174" comment="texlive-environ-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806175" comment="texlive-epsf-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806176" comment="texlive-epstopdf-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806177" comment="texlive-epstopdf-pkg-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806178" comment="texlive-eqparbox-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806179" comment="texlive-eso-pic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806180" comment="texlive-etex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806181" comment="texlive-etex-pkg-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806182" comment="texlive-etexcmds-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806183" comment="texlive-etoc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806184" comment="texlive-etoolbox-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806185" comment="texlive-euenc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806186" comment="texlive-euler-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806187" comment="texlive-euro-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806188" comment="texlive-eurosym-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806189" comment="texlive-extsizes-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806190" comment="texlive-fancybox-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806191" comment="texlive-fancyhdr-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806192" comment="texlive-fancyref-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806193" comment="texlive-fancyvrb-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806194" comment="texlive-filecontents-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806195" comment="texlive-filehook-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806196" comment="texlive-finstrut-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806197" comment="texlive-fix2col-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806198" comment="texlive-fixlatvian-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806199" comment="texlive-float-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806200" comment="texlive-fmtcount-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806201" comment="texlive-fncychap-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806202" comment="texlive-fontawesome-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806203" comment="texlive-fontbook-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806204" comment="texlive-fonts-tlwg-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806205" comment="texlive-fontspec-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806206" comment="texlive-fontware-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806207" comment="texlive-fontwrap-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806208" comment="texlive-footmisc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806209" comment="texlive-footnotehyper-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806210" comment="texlive-fp-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806211" comment="texlive-fpl-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806212" comment="texlive-framed-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806213" comment="texlive-garuda-c90-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806214" comment="texlive-geometry-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806215" comment="texlive-gettitlestring-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806216" comment="texlive-glyphlist-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806217" comment="texlive-gnu-freefont-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806218" comment="texlive-graphics-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806219" comment="texlive-graphics-cfg-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806220" comment="texlive-graphics-def-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806221" comment="texlive-grfext-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806222" comment="texlive-grffile-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806223" comment="texlive-gsftopk-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806224" comment="texlive-hanging-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806225" comment="texlive-helvetic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806226" comment="texlive-hobsub-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806227" comment="texlive-hologo-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806228" comment="texlive-hycolor-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806229" comment="texlive-hyperref-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806230" comment="texlive-hyph-utf8-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806231" comment="texlive-hyphen-base-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806232" comment="texlive-hyphenat-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806233" comment="texlive-hyphenex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806234" comment="texlive-ifetex-20180414-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806235" comment="texlive-ifluatex-20180414-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806236" comment="texlive-ifmtarg-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806237" comment="texlive-ifoddpage-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806238" comment="texlive-ifplatform-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806239" comment="texlive-iftex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806240" comment="texlive-ifxetex-20180414-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806241" comment="texlive-import-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806242" comment="texlive-index-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806243" comment="texlive-infwarerr-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806244" comment="texlive-intcalc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806245" comment="texlive-jadetex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806246" comment="texlive-jknapltx-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806247" comment="texlive-kastrup-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806248" comment="texlive-kerkis-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806249" comment="texlive-knuth-lib-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806250" comment="texlive-knuth-local-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806251" comment="texlive-koma-script-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806252" comment="texlive-kpathsea-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806253" comment="texlive-kvdefinekeys-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806254" comment="texlive-kvoptions-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806255" comment="texlive-kvsetkeys-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806256" comment="texlive-l3backend-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806257" comment="texlive-l3experimental-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806258" comment="texlive-l3kernel-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806259" comment="texlive-l3packages-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806260" comment="texlive-lastpage-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806261" comment="texlive-latex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806262" comment="texlive-latex-fonts-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806263" comment="texlive-latex2man-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806264" comment="texlive-latexbug-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806265" comment="texlive-latexconfig-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806266" comment="texlive-letltxmacro-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806267" comment="texlive-lettrine-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806268" comment="texlive-lib-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806269" comment="texlive-lib-devel-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806270" comment="texlive-linegoal-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806271" comment="texlive-lineno-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806272" comment="texlive-listings-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806273" comment="texlive-listofitems-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806274" comment="texlive-lm-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806275" comment="texlive-lm-math-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806276" comment="texlive-ltabptch-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806277" comment="texlive-ltxcmds-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806278" comment="texlive-ltxmisc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806279" comment="texlive-lua-alt-getopt-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806280" comment="texlive-luahbtex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806281" comment="texlive-lualatex-math-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806282" comment="texlive-lualibs-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806283" comment="texlive-luaotfload-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806284" comment="texlive-luatex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806285" comment="texlive-luatex85-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806286" comment="texlive-luatexbase-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806287" comment="texlive-lwarp-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806288" comment="texlive-makecmds-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806289" comment="texlive-makeindex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806290" comment="texlive-manfnt-font-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806291" comment="texlive-marginnote-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806292" comment="texlive-marvosym-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806293" comment="texlive-mathpazo-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806294" comment="texlive-mathspec-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806295" comment="texlive-mathtools-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806296" comment="texlive-mdwtools-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806297" comment="texlive-memoir-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806298" comment="texlive-metafont-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806299" comment="texlive-metalogo-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806300" comment="texlive-metapost-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806301" comment="texlive-mflogo-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806302" comment="texlive-mflogo-font-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806303" comment="texlive-mfnfss-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806304" comment="texlive-mfware-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806305" comment="texlive-microtype-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806306" comment="texlive-minitoc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806307" comment="texlive-mnsymbol-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806308" comment="texlive-modes-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806309" comment="texlive-mparhack-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806310" comment="texlive-mptopdf-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806311" comment="texlive-ms-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806312" comment="texlive-multido-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806313" comment="texlive-multirow-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806314" comment="texlive-natbib-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806315" comment="texlive-ncctools-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806316" comment="texlive-ncntrsbk-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806317" comment="texlive-needspace-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806318" comment="texlive-newfloat-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806319" comment="texlive-newunicodechar-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806320" comment="texlive-norasi-c90-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806321" comment="texlive-notoccite-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806322" comment="texlive-ntgclass-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806323" comment="texlive-oberdiek-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806324" comment="texlive-obsolete-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806325" comment="texlive-overpic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806326" comment="texlive-palatino-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806327" comment="texlive-paralist-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806328" comment="texlive-parallel-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806329" comment="texlive-parskip-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806330" comment="texlive-passivetex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806331" comment="texlive-pdfcolmk-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806332" comment="texlive-pdfescape-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806333" comment="texlive-pdflscape-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806334" comment="texlive-pdfpages-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806335" comment="texlive-pdftex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806336" comment="texlive-pdftexcmds-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806337" comment="texlive-pgf-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806338" comment="texlive-philokalia-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806339" comment="texlive-placeins-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806340" comment="texlive-plain-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806341" comment="texlive-polyglossia-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806342" comment="texlive-powerdot-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806343" comment="texlive-preprint-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806344" comment="texlive-psfrag-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806345" comment="texlive-pslatex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806346" comment="texlive-psnfss-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806347" comment="texlive-pspicture-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806348" comment="texlive-pst-3d-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806349" comment="texlive-pst-arrow-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806350" comment="texlive-pst-blur-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806351" comment="texlive-pst-coil-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806352" comment="texlive-pst-eps-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806353" comment="texlive-pst-fill-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806354" comment="texlive-pst-grad-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806355" comment="texlive-pst-math-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806356" comment="texlive-pst-node-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806357" comment="texlive-pst-plot-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806358" comment="texlive-pst-slpe-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806359" comment="texlive-pst-text-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806360" comment="texlive-pst-tools-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806361" comment="texlive-pst-tree-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806362" comment="texlive-pstricks-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806363" comment="texlive-pstricks-add-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806364" comment="texlive-ptext-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806365" comment="texlive-pxfonts-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806366" comment="texlive-qstest-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806367" comment="texlive-ragged2e-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806368" comment="texlive-rcs-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806369" comment="texlive-realscripts-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806370" comment="texlive-refcount-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806371" comment="texlive-rerunfilecheck-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806372" comment="texlive-rsfs-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806373" comment="texlive-sansmath-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806374" comment="texlive-sansmathaccent-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806375" comment="texlive-sauerj-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806376" comment="texlive-scheme-basic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806377" comment="texlive-section-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806378" comment="texlive-sectsty-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806379" comment="texlive-seminar-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806380" comment="texlive-sepnum-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806381" comment="texlive-setspace-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806382" comment="texlive-showexpl-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806383" comment="texlive-soul-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806384" comment="texlive-stackengine-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806385" comment="texlive-stmaryrd-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806386" comment="texlive-stringenc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806387" comment="texlive-subfig-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806388" comment="texlive-subfigure-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806389" comment="texlive-svn-prov-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806390" comment="texlive-symbol-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806391" comment="texlive-t2-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806392" comment="texlive-tabu-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806393" comment="texlive-tabulary-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806394" comment="texlive-tetex-20180414-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806395" comment="texlive-tex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806396" comment="texlive-tex-gyre-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806397" comment="texlive-tex-gyre-math-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806398" comment="texlive-tex-ini-files-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806399" comment="texlive-tex4ht-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806400" comment="texlive-texconfig-20180414-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806401" comment="texlive-texlive-common-doc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806402" comment="texlive-texlive-docindex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806403" comment="texlive-texlive-en-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806404" comment="texlive-texlive-msg-translations-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806405" comment="texlive-texlive-scripts-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806406" comment="texlive-texlive-scripts-extra-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806407" comment="texlive-texlive.infra-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806408" comment="texlive-textcase-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806409" comment="texlive-textpos-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806410" comment="texlive-threeparttable-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806411" comment="texlive-thumbpdf-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806412" comment="texlive-times-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806413" comment="texlive-tipa-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806414" comment="texlive-titlesec-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806415" comment="texlive-titling-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806416" comment="texlive-tocloft-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806417" comment="texlive-tools-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806418" comment="texlive-translator-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806419" comment="texlive-trimspaces-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806420" comment="texlive-txfonts-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806421" comment="texlive-type1cm-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806422" comment="texlive-typehtml-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806423" comment="texlive-ucharcat-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806424" comment="texlive-ucharclasses-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806425" comment="texlive-ucs-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806426" comment="texlive-uhc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806427" comment="texlive-ulem-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806428" comment="texlive-underscore-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806429" comment="texlive-unicode-data-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806430" comment="texlive-unicode-math-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806431" comment="texlive-uniquecounter-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806432" comment="texlive-unisugar-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806433" comment="texlive-updmap-map-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806434" comment="texlive-upquote-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806435" comment="texlive-url-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806436" comment="texlive-utopia-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806437" comment="texlive-varwidth-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806438" comment="texlive-wadalab-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806439" comment="texlive-was-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806440" comment="texlive-wasy-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806441" comment="texlive-wasy-type1-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806442" comment="texlive-wasy2-ps-20180414-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806443" comment="texlive-wasysym-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806444" comment="texlive-wrapfig-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806445" comment="texlive-xcolor-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806446" comment="texlive-xdvi-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806447" comment="texlive-xecjk-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806448" comment="texlive-xecolor-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806449" comment="texlive-xecyr-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806450" comment="texlive-xeindex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806451" comment="texlive-xepersian-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806452" comment="texlive-xesearch-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806453" comment="texlive-xetex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806454" comment="texlive-xetex-itrans-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806455" comment="texlive-xetex-pstricks-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806456" comment="texlive-xetex-tibetan-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806457" comment="texlive-xetexconfig-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806458" comment="texlive-xetexfontinfo-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806459" comment="texlive-xifthen-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806460" comment="texlive-xkeyval-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806461" comment="texlive-xltxtra-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806462" comment="texlive-xmltex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806463" comment="texlive-xmltexconfig-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806464" comment="texlive-xstring-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806465" comment="texlive-xtab-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806466" comment="texlive-xunicode-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806467" comment="texlive-zapfchan-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806468" comment="texlive-zapfding-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806469" comment="texlive-zref-20200406-26.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3873" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-48281" ref_url="https://www.suse.com/security/cve/CVE-2022-48281/" source="CVE"/>
		<reference ref_id="CVE-2023-0795" ref_url="https://www.suse.com/security/cve/CVE-2023-0795/" source="CVE"/>
		<reference ref_id="CVE-2023-0796" ref_url="https://www.suse.com/security/cve/CVE-2023-0796/" source="CVE"/>
		<reference ref_id="CVE-2023-0797" ref_url="https://www.suse.com/security/cve/CVE-2023-0797/" source="CVE"/>
		<reference ref_id="CVE-2023-0798" ref_url="https://www.suse.com/security/cve/CVE-2023-0798/" source="CVE"/>
		<reference ref_id="CVE-2023-0799" ref_url="https://www.suse.com/security/cve/CVE-2023-0799/" source="CVE"/>
		<reference ref_id="CVE-2023-0800" ref_url="https://www.suse.com/security/cve/CVE-2023-0800/" source="CVE"/>
		<reference ref_id="CVE-2023-0801" ref_url="https://www.suse.com/security/cve/CVE-2023-0801/" source="CVE"/>
		<reference ref_id="CVE-2023-0802" ref_url="https://www.suse.com/security/cve/CVE-2023-0802/" source="CVE"/>
		<reference ref_id="CVE-2023-0803" ref_url="https://www.suse.com/security/cve/CVE-2023-0803/" source="CVE"/>
		<reference ref_id="CVE-2023-0804" ref_url="https://www.suse.com/security/cve/CVE-2023-0804/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3711.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3711.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48281/">CVE-2022-48281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48281">CVE-2022-48281 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0795/">CVE-2023-0795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0795">CVE-2023-0795 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0796/">CVE-2023-0796 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0796">CVE-2023-0796 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0797/">CVE-2023-0797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0797">CVE-2023-0797 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0798/">CVE-2023-0798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0798">CVE-2023-0798 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0799/">CVE-2023-0799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0799">CVE-2023-0799 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0800/">CVE-2023-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0800">CVE-2023-0800 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0801/">CVE-2023-0801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0801">CVE-2023-0801 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0802/">CVE-2023-0802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0802">CVE-2023-0802 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0803/">CVE-2023-0803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0803">CVE-2023-0803 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0804/">CVE-2023-0804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0804">CVE-2023-0804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806470" comment="libtiff-4.4.0-8.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806471" comment="libtiff-devel-4.4.0-8.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806472" comment="libtiff-tools-4.4.0-8.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3874" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3714.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3714.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806473" comment="postgresql-13.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806474" comment="postgresql-contrib-13.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806475" comment="postgresql-docs-13.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806476" comment="postgresql-plperl-13.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806477" comment="postgresql-plpython3-13.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806478" comment="postgresql-pltcl-13.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806479" comment="postgresql-private-devel-13.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806480" comment="postgresql-private-libs-13.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806481" comment="postgresql-server-13.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806482" comment="postgresql-server-devel-13.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806483" comment="postgresql-static-13.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806484" comment="postgresql-test-13.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806485" comment="postgresql-upgrade-13.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806486" comment="postgresql-upgrade-devel-13.11-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3875" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-2700" ref_url="https://www.suse.com/security/cve/CVE-2023-2700/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3715.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3715.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2700/">CVE-2023-2700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2700">CVE-2023-2700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806487" comment="libvirt-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806488" comment="libvirt-client-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806489" comment="libvirt-client-qemu-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806490" comment="libvirt-daemon-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806491" comment="libvirt-daemon-config-network-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806492" comment="libvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806493" comment="libvirt-daemon-driver-interface-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806494" comment="libvirt-daemon-driver-network-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806495" comment="libvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806496" comment="libvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806497" comment="libvirt-daemon-driver-qemu-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806498" comment="libvirt-daemon-driver-secret-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806499" comment="libvirt-daemon-driver-storage-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806500" comment="libvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806501" comment="libvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806502" comment="libvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806503" comment="libvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806504" comment="libvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806505" comment="libvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806506" comment="libvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806507" comment="libvirt-daemon-kvm-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806508" comment="libvirt-devel-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806509" comment="libvirt-docs-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806510" comment="libvirt-libs-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806511" comment="libvirt-lock-sanlock-9.0.0-10.2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806512" comment="libvirt-nss-9.0.0-10.2.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3876" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464/" source="CVE"/>
		<reference ref_id="CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465/" source="CVE"/>
		<reference ref_id="CVE-2023-0466" ref_url="https://www.suse.com/security/cve/CVE-2023-0466/" source="CVE"/>
		<reference ref_id="CVE-2023-1255" ref_url="https://www.suse.com/security/cve/CVE-2023-1255/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3722.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3722.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-0466/">CVE-2023-0466 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1255/">CVE-2023-1255 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1255">CVE-2023-1255 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806513" comment="openssl-3.0.7-16.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806514" comment="openssl-devel-3.0.7-16.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806515" comment="openssl-libs-3.0.7-16.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806516" comment="openssl-perl-3.0.7-16.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3877" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-2002" ref_url="https://www.suse.com/security/cve/CVE-2023-2002/" source="CVE"/>
		<reference ref_id="CVE-2023-2124" ref_url="https://www.suse.com/security/cve/CVE-2023-2124/" source="CVE"/>
		<reference ref_id="CVE-2023-2194" ref_url="https://www.suse.com/security/cve/CVE-2023-2194/" source="CVE"/>
		<reference ref_id="CVE-2023-2235" ref_url="https://www.suse.com/security/cve/CVE-2023-2235/" source="CVE"/>
		<reference ref_id="CVE-2023-28466" ref_url="https://www.suse.com/security/cve/CVE-2023-28466/" source="CVE"/>
		<reference ref_id="CVE-2023-32233" ref_url="https://www.suse.com/security/cve/CVE-2023-32233/" source="CVE"/>
		<reference ref_id="CVE-2023-54325" ref_url="https://www.suse.com/security/cve/CVE-2023-54325/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3723.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3723.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2002/">CVE-2023-2002 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2124/">CVE-2023-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-2194/">CVE-2023-2194 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2194">CVE-2023-2194 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2235/">CVE-2023-2235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28466/">CVE-2023-28466 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32233/">CVE-2023-32233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54325/">CVE-2023-54325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54325">CVE-2023-54325 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806517" comment="bpftool-7.0.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806518" comment="kernel-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806519" comment="kernel-abi-stablelists-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806520" comment="kernel-core-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806521" comment="kernel-cross-headers-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806522" comment="kernel-debug-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806523" comment="kernel-debug-core-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806526" comment="kernel-debug-modules-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806527" comment="kernel-debug-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806528" comment="kernel-debug-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806529" comment="kernel-debug-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806532" comment="kernel-doc-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806533" comment="kernel-headers-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806534" comment="kernel-modules-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806535" comment="kernel-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806536" comment="kernel-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806537" comment="kernel-tools-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806538" comment="kernel-tools-libs-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806540" comment="kernel-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806541" comment="perf-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806542" comment="python3-perf-5.14.0-284.18.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806543" comment="rtla-5.14.0-284.18.1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3878" version="1" class="patch">
	<metadata>
		<title>security update for less (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-46663" ref_url="https://www.suse.com/security/cve/CVE-2022-46663/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3725.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3725.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46663/">CVE-2022-46663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46663">CVE-2022-46663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806544" comment="less-590-2.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3879" version="1" class="patch">
	<metadata>
		<title>security update for go-toolset (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-29402" ref_url="https://www.suse.com/security/cve/CVE-2023-29402/" source="CVE"/>
		<reference ref_id="CVE-2023-29403" ref_url="https://www.suse.com/security/cve/CVE-2023-29403/" source="CVE"/>
		<reference ref_id="CVE-2023-29404" ref_url="https://www.suse.com/security/cve/CVE-2023-29404/" source="CVE"/>
		<reference ref_id="CVE-2023-29405" ref_url="https://www.suse.com/security/cve/CVE-2023-29405/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3923.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3923.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29402/">CVE-2023-29402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29403/">CVE-2023-29403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29404/">CVE-2023-29404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29405/">CVE-2023-29405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806545" comment="go-toolset-1.19.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806546" comment="golang-1.19.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806547" comment="golang-bin-1.19.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806548" comment="golang-docs-1.19.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806549" comment="golang-misc-1.19.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806550" comment="golang-race-1.19.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806551" comment="golang-src-1.19.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806552" comment="golang-tests-1.19.10-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3880" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-3128" ref_url="https://www.suse.com/security/cve/CVE-2023-3128/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4030.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4030.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-3128/">CVE-2023-3128 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3128">CVE-2023-3128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806553" comment="grafana-9.0.9-3.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3881" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-33170" ref_url="https://www.suse.com/security/cve/CVE-2023-33170/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4057.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4057.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33170/">CVE-2023-33170 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33170">CVE-2023-33170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806554" comment="aspnetcore-runtime-7.0-7.0.9-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806555" comment="aspnetcore-targeting-pack-7.0-7.0.9-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806556" comment="dotnet-apphost-pack-7.0-7.0.9-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806557" comment="dotnet-host-7.0.9-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806558" comment="dotnet-hostfxr-7.0-7.0.9-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806559" comment="dotnet-runtime-7.0-7.0.9-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806560" comment="dotnet-sdk-7.0-7.0.109-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806561" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806562" comment="dotnet-targeting-pack-7.0-7.0.9-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806563" comment="dotnet-templates-7.0-7.0.109-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806564" comment="netstandard-targeting-pack-2.1-7.0.109-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3882" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-33170" ref_url="https://www.suse.com/security/cve/CVE-2023-33170/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4060.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4060.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33170/">CVE-2023-33170 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33170">CVE-2023-33170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806565" comment="aspnetcore-runtime-6.0-6.0.20-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806566" comment="aspnetcore-targeting-pack-6.0-6.0.20-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806567" comment="dotnet-apphost-pack-6.0-6.0.20-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806568" comment="dotnet-hostfxr-6.0-6.0.20-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806569" comment="dotnet-runtime-6.0-6.0.20-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806570" comment="dotnet-sdk-6.0-6.0.120-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806571" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806572" comment="dotnet-targeting-pack-6.0-6.0.20-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806573" comment="dotnet-templates-6.0-6.0.120-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3883" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201/" source="CVE"/>
		<reference ref_id="CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202/" source="CVE"/>
		<reference ref_id="CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207/" source="CVE"/>
		<reference ref_id="CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208/" source="CVE"/>
		<reference ref_id="CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4064.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4064.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806574" comment="thunderbird-102.13.0-2.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3884" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201/" source="CVE"/>
		<reference ref_id="CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202/" source="CVE"/>
		<reference ref_id="CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207/" source="CVE"/>
		<reference ref_id="CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208/" source="CVE"/>
		<reference ref_id="CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4071.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4071.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806575" comment="firefox-102.13.0-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806576" comment="firefox-x11-102.13.0-2.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3885" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-2828" ref_url="https://www.suse.com/security/cve/CVE-2023-2828/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4099.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4099.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2828/">CVE-2023-2828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2828">CVE-2023-2828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806577" comment="bind-9.16.23-11.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806578" comment="bind-chroot-9.16.23-11.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806579" comment="bind-devel-9.16.23-11.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806580" comment="bind-dnssec-doc-9.16.23-11.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806581" comment="bind-dnssec-utils-9.16.23-11.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806582" comment="bind-doc-9.16.23-11.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806583" comment="bind-libs-9.16.23-11.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806584" comment="bind-license-9.16.23-11.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806585" comment="bind-utils-9.16.23-11.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806586" comment="python3-bind-9.16.23-11.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3886" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4158.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4158.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806587" comment="java-11-openjdk-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806588" comment="java-11-openjdk-demo-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806589" comment="java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806590" comment="java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806591" comment="java-11-openjdk-devel-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806592" comment="java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806593" comment="java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806594" comment="java-11-openjdk-fastdebug-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806595" comment="java-11-openjdk-headless-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806596" comment="java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806597" comment="java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806598" comment="java-11-openjdk-javadoc-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806599" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806600" comment="java-11-openjdk-jmods-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806601" comment="java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806602" comment="java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806603" comment="java-11-openjdk-slowdebug-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806604" comment="java-11-openjdk-src-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806605" comment="java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806606" comment="java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806607" comment="java-11-openjdk-static-libs-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806608" comment="java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806609" comment="java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3887" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22044" ref_url="https://www.suse.com/security/cve/CVE-2023-22044/" source="CVE"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4177.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4177.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22044/">CVE-2023-22044 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22044">CVE-2023-22044 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806610" comment="java-17-openjdk-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806611" comment="java-17-openjdk-demo-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806612" comment="java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806613" comment="java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806614" comment="java-17-openjdk-devel-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806615" comment="java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806616" comment="java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806617" comment="java-17-openjdk-fastdebug-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806618" comment="java-17-openjdk-headless-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806619" comment="java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806620" comment="java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806621" comment="java-17-openjdk-javadoc-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806622" comment="java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806623" comment="java-17-openjdk-jmods-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806624" comment="java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806625" comment="java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806626" comment="java-17-openjdk-slowdebug-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806627" comment="java-17-openjdk-src-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806628" comment="java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806629" comment="java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806630" comment="java-17-openjdk-static-libs-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806631" comment="java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806632" comment="java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3888" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4178.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4178.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806633" comment="java-1.8.0-openjdk-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806634" comment="java-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806635" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806636" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806637" comment="java-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806638" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806639" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806640" comment="java-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806641" comment="java-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806642" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806643" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806644" comment="java-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806645" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806646" comment="java-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806647" comment="java-1.8.0-openjdk-src-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806648" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806649" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3889" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-32885" ref_url="https://www.suse.com/security/cve/CVE-2022-32885/" source="CVE"/>
		<reference ref_id="CVE-2023-28198" ref_url="https://www.suse.com/security/cve/CVE-2023-28198/" source="CVE"/>
		<reference ref_id="CVE-2023-32435" ref_url="https://www.suse.com/security/cve/CVE-2023-32435/" source="CVE"/>
		<reference ref_id="CVE-2023-32439" ref_url="https://www.suse.com/security/cve/CVE-2023-32439/" source="CVE"/>
		<reference ref_id="CVE-2023-35074" ref_url="https://www.suse.com/security/cve/CVE-2023-35074/" source="CVE"/>
		<reference ref_id="CVE-2023-37450" ref_url="https://www.suse.com/security/cve/CVE-2023-37450/" source="CVE"/>
		<reference ref_id="CVE-2023-38594" ref_url="https://www.suse.com/security/cve/CVE-2023-38594/" source="CVE"/>
		<reference ref_id="CVE-2023-38595" ref_url="https://www.suse.com/security/cve/CVE-2023-38595/" source="CVE"/>
		<reference ref_id="CVE-2023-41074" ref_url="https://www.suse.com/security/cve/CVE-2023-41074/" source="CVE"/>
		<reference ref_id="CVE-2023-41993" ref_url="https://www.suse.com/security/cve/CVE-2023-41993/" source="CVE"/>
		<reference ref_id="CVE-2023-42916" ref_url="https://www.suse.com/security/cve/CVE-2023-42916/" source="CVE"/>
		<reference ref_id="CVE-2024-23222" ref_url="https://www.suse.com/security/cve/CVE-2024-23222/" source="CVE"/>
		<reference ref_id="CVE-2024-23252" ref_url="https://www.suse.com/security/cve/CVE-2024-23252/" source="CVE"/>
		<reference ref_id="CVE-2024-27808" ref_url="https://www.suse.com/security/cve/CVE-2024-27808/" source="CVE"/>
		<reference ref_id="CVE-2024-27833" ref_url="https://www.suse.com/security/cve/CVE-2024-27833/" source="CVE"/>
		<reference ref_id="CVE-2024-27834" ref_url="https://www.suse.com/security/cve/CVE-2024-27834/" source="CVE"/>
		<reference ref_id="CVE-2024-54658" ref_url="https://www.suse.com/security/cve/CVE-2024-54658/" source="CVE"/>
		<reference ref_id="CVE-2025-24158" ref_url="https://www.suse.com/security/cve/CVE-2025-24158/" source="CVE"/>
		<reference ref_id="CVE-2025-24223" ref_url="https://www.suse.com/security/cve/CVE-2025-24223/" source="CVE"/>
		<reference ref_id="CVE-2025-24264" ref_url="https://www.suse.com/security/cve/CVE-2025-24264/" source="CVE"/>
		<reference ref_id="CVE-2025-31204" ref_url="https://www.suse.com/security/cve/CVE-2025-31204/" source="CVE"/>
		<reference ref_id="CVE-2025-31206" ref_url="https://www.suse.com/security/cve/CVE-2025-31206/" source="CVE"/>
		<reference ref_id="CVE-2025-31215" ref_url="https://www.suse.com/security/cve/CVE-2025-31215/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4201.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4201.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32885/">CVE-2022-32885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32885">CVE-2022-32885 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28198/">CVE-2023-28198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28198">CVE-2023-28198 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32435/">CVE-2023-32435 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32435">CVE-2023-32435 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32439/">CVE-2023-32439 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32439">CVE-2023-32439 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35074/">CVE-2023-35074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35074">CVE-2023-35074 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37450/">CVE-2023-37450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37450">CVE-2023-37450 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38594/">CVE-2023-38594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38594">CVE-2023-38594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38595/">CVE-2023-38595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38595">CVE-2023-38595 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41074/">CVE-2023-41074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41074">CVE-2023-41074 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-41993/">CVE-2023-41993 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41993">CVE-2023-41993 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-42916/">CVE-2023-42916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42916">CVE-2023-42916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23222/">CVE-2024-23222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23222">CVE-2024-23222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23252/">CVE-2024-23252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23252">CVE-2024-23252 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27808/">CVE-2024-27808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27808">CVE-2024-27808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27833/">CVE-2024-27833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27833">CVE-2024-27833 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27834/">CVE-2024-27834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27834">CVE-2024-27834 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54658/">CVE-2024-54658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54658">CVE-2024-54658 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24158/">CVE-2025-24158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24158">CVE-2025-24158 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24223/">CVE-2025-24223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24223">CVE-2025-24223 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24264/">CVE-2025-24264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24264">CVE-2025-24264 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-31204/">CVE-2025-31204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31204">CVE-2025-31204 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-31206/">CVE-2025-31206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31206">CVE-2025-31206 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-31215/">CVE-2025-31215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31215">CVE-2025-31215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3890" version="1" class="patch">
	<metadata>
		<title>security update for samba (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-3347" ref_url="https://www.suse.com/security/cve/CVE-2023-3347/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4325.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4325.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-3347/">CVE-2023-3347 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3347">CVE-2023-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806654" comment="ctdb-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806655" comment="libnetapi-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806656" comment="libnetapi-devel-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806657" comment="libsmbclient-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806658" comment="libsmbclient-devel-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806659" comment="libwbclient-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806660" comment="libwbclient-devel-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806661" comment="python3-samba-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806662" comment="python3-samba-dc-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806663" comment="python3-samba-devel-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806664" comment="python3-samba-test-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806665" comment="samba-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806666" comment="samba-client-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806667" comment="samba-client-libs-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806668" comment="samba-common-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806669" comment="samba-common-libs-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806670" comment="samba-common-tools-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806671" comment="samba-dc-libs-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806672" comment="samba-dcerpc-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806673" comment="samba-devel-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806674" comment="samba-krb5-printing-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806675" comment="samba-ldb-ldap-modules-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806676" comment="samba-libs-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806677" comment="samba-pidl-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806678" comment="samba-test-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806679" comment="samba-test-libs-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806680" comment="samba-tools-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806681" comment="samba-usershares-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806682" comment="samba-vfs-iouring-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806683" comment="samba-winbind-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806684" comment="samba-winbind-clients-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806685" comment="samba-winbind-krb5-locator-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806686" comment="samba-winbind-modules-4.17.5-103.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806687" comment="samba-winexe-4.17.5-103.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3891" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454/" source="CVE"/>
		<reference ref_id="CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4327.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4327.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806688" comment="pg_repack-1.4.8-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806691" comment="postgresql-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806692" comment="postgresql-contrib-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806693" comment="postgresql-docs-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806694" comment="postgresql-plperl-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806695" comment="postgresql-plpython3-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806696" comment="postgresql-pltcl-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806697" comment="postgresql-private-devel-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806698" comment="postgresql-private-libs-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806699" comment="postgresql-server-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806700" comment="postgresql-server-devel-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806701" comment="postgresql-static-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806702" comment="postgresql-test-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806703" comment="postgresql-test-rpm-macros-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806704" comment="postgresql-upgrade-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806705" comment="postgresql-upgrade-devel-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3892" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-30581" ref_url="https://www.suse.com/security/cve/CVE-2023-30581/" source="CVE"/>
		<reference ref_id="CVE-2023-30588" ref_url="https://www.suse.com/security/cve/CVE-2023-30588/" source="CVE"/>
		<reference ref_id="CVE-2023-30589" ref_url="https://www.suse.com/security/cve/CVE-2023-30589/" source="CVE"/>
		<reference ref_id="CVE-2023-30590" ref_url="https://www.suse.com/security/cve/CVE-2023-30590/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4331.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4331.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30581/">CVE-2023-30581 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30581">CVE-2023-30581 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30588/">CVE-2023-30588 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30588">CVE-2023-30588 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-30589/">CVE-2023-30589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30589">CVE-2023-30589 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-30590/">CVE-2023-30590 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30590">CVE-2023-30590 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806706" comment="nodejs-16.20.1-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806707" comment="nodejs-docs-16.20.1-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806708" comment="nodejs-full-i18n-16.20.1-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806709" comment="nodejs-libs-16.20.1-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806710" comment="npm-8.19.4-1.16.20.1.1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3893" version="1" class="patch">
	<metadata>
		<title>security update for libeconf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-22652" ref_url="https://www.suse.com/security/cve/CVE-2023-22652/" source="CVE"/>
		<reference ref_id="CVE-2023-30079" ref_url="https://www.suse.com/security/cve/CVE-2023-30079/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4347.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4347.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22652/">CVE-2023-22652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22652">CVE-2023-22652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30079/">CVE-2023-30079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30079">CVE-2023-30079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806711" comment="libeconf-0.4.1-3.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3894" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-28484" ref_url="https://www.suse.com/security/cve/CVE-2023-28484/" source="CVE"/>
		<reference ref_id="CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4349.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4349.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28484/">CVE-2023-28484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806712" comment="libxml2-2.9.13-3.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806713" comment="libxml2-devel-2.9.13-3.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806714" comment="python3-libxml2-2.9.13-3.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3895" version="1" class="patch">
	<metadata>
		<title>security update for python-requests (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4350.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4350.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806715" comment="python3-requests-2.25.1-7.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806716" comment="python3-requests+security-2.25.1-7.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806717" comment="python3-requests+socks-2.25.1-7.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3896" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-28321" ref_url="https://www.suse.com/security/cve/CVE-2023-28321/" source="CVE"/>
		<reference ref_id="CVE-2023-28322" ref_url="https://www.suse.com/security/cve/CVE-2023-28322/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4354.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4354.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28321/">CVE-2023-28321 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28322/">CVE-2023-28322 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806718" comment="curl-7.76.1-23.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806719" comment="curl-minimal-7.76.1-23.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806720" comment="libcurl-7.76.1-23.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806721" comment="libcurl-devel-7.76.1-23.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806722" comment="libcurl-minimal-7.76.1-23.el9_2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3897" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-45869" ref_url="https://www.suse.com/security/cve/CVE-2022-45869/" source="CVE"/>
		<reference ref_id="CVE-2023-0458" ref_url="https://www.suse.com/security/cve/CVE-2023-0458/" source="CVE"/>
		<reference ref_id="CVE-2023-1998" ref_url="https://www.suse.com/security/cve/CVE-2023-1998/" source="CVE"/>
		<reference ref_id="CVE-2023-3090" ref_url="https://www.suse.com/security/cve/CVE-2023-3090/" source="CVE"/>
		<reference ref_id="CVE-2023-35788" ref_url="https://www.suse.com/security/cve/CVE-2023-35788/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4377.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4377.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45869/">CVE-2022-45869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45869">CVE-2022-45869 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0458/">CVE-2023-0458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0458">CVE-2023-0458 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1998/">CVE-2023-1998 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1998">CVE-2023-1998 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3090/">CVE-2023-3090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35788/">CVE-2023-35788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806723" comment="bpftool-7.0.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806724" comment="kernel-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806725" comment="kernel-abi-stablelists-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806726" comment="kernel-core-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806727" comment="kernel-cross-headers-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806728" comment="kernel-debug-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806729" comment="kernel-debug-core-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806732" comment="kernel-debug-modules-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806733" comment="kernel-debug-modules-core-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806734" comment="kernel-debug-modules-extra-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806735" comment="kernel-debug-uki-virt-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806738" comment="kernel-doc-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806739" comment="kernel-headers-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806740" comment="kernel-modules-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806741" comment="kernel-modules-core-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806742" comment="kernel-modules-extra-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806743" comment="kernel-tools-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806744" comment="kernel-tools-libs-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806746" comment="kernel-uki-virt-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806747" comment="perf-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806748" comment="python3-perf-5.14.0-284.25.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806749" comment="rtla-5.14.0-284.25.1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3898" version="1" class="patch">
	<metadata>
		<title>security update for cjose (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-37464" ref_url="https://www.suse.com/security/cve/CVE-2023-37464/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4411.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4411.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-37464/">CVE-2023-37464 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37464">CVE-2023-37464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806750" comment="cjose-0.6.1-13.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3899" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-38408" ref_url="https://www.suse.com/security/cve/CVE-2023-38408/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4412.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4412.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38408/">CVE-2023-38408 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806751" comment="openssh-8.7p1-30.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806752" comment="openssh-clients-8.7p1-30.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806753" comment="openssh-keycat-8.7p1-30.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806754" comment="openssh-server-8.7p1-30.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3900" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<reference ref_id="CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4462.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4462.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806755" comment="firefox-102.14.0-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806756" comment="firefox-x11-102.14.0-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3901" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-3417" ref_url="https://www.suse.com/security/cve/CVE-2023-3417/" source="CVE"/>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<reference ref_id="CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4499.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4499.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3417/">CVE-2023-3417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3417">CVE-2023-3417 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806757" comment="thunderbird-102.14.0-1.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3902" version="1" class="patch">
	<metadata>
		<title>security update for dbus (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-34969" ref_url="https://www.suse.com/security/cve/CVE-2023-34969/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4569.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4569.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34969/">CVE-2023-34969 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34969">CVE-2023-34969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806758" comment="dbus-1.12.20-7.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806759" comment="dbus-common-1.12.20-7.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806760" comment="dbus-daemon-1.12.20-7.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806761" comment="dbus-devel-1.12.20-7.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806762" comment="dbus-libs-1.12.20-7.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806763" comment="dbus-tools-1.12.20-7.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806764" comment="dbus-x11-1.12.20-7.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3903" version="1" class="patch">
	<metadata>
		<title>security update for iperf3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-38403" ref_url="https://www.suse.com/security/cve/CVE-2023-38403/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4571.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4571.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38403/">CVE-2023-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38403">CVE-2023-38403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806765" comment="iperf3-3.9-10.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3904" version="1" class="patch">
	<metadata>
		<title>security update for rust (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-38497" ref_url="https://www.suse.com/security/cve/CVE-2023-38497/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4634.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4634.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38497/">CVE-2023-38497 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38497">CVE-2023-38497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806766" comment="cargo-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806767" comment="clippy-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806768" comment="rust-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806769" comment="rust-analysis-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806770" comment="rust-analyzer-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806771" comment="rust-debugger-common-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806772" comment="rust-doc-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806773" comment="rust-gdb-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806774" comment="rust-lldb-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806775" comment="rust-src-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806776" comment="rust-std-static-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806777" comment="rust-std-static-wasm32-unknown-unknown-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806778" comment="rust-std-static-wasm32-wasi-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806779" comment="rust-toolset-1.66.1-2.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806780" comment="rustfmt-1.66.1-2.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3905" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-35390" ref_url="https://www.suse.com/security/cve/CVE-2023-35390/" source="CVE"/>
		<reference ref_id="CVE-2023-38180" ref_url="https://www.suse.com/security/cve/CVE-2023-38180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4642.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4642.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-35390/">CVE-2023-35390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35390">CVE-2023-35390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38180/">CVE-2023-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38180">CVE-2023-38180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806781" comment="aspnetcore-runtime-7.0-7.0.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806782" comment="aspnetcore-targeting-pack-7.0-7.0.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806783" comment="dotnet-apphost-pack-7.0-7.0.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806784" comment="dotnet-host-7.0.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806785" comment="dotnet-hostfxr-7.0-7.0.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806786" comment="dotnet-runtime-7.0-7.0.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806787" comment="dotnet-sdk-7.0-7.0.110-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806788" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806789" comment="dotnet-targeting-pack-7.0-7.0.10-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806790" comment="dotnet-templates-7.0-7.0.110-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806791" comment="netstandard-targeting-pack-2.1-7.0.110-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3906" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-35390" ref_url="https://www.suse.com/security/cve/CVE-2023-35390/" source="CVE"/>
		<reference ref_id="CVE-2023-38180" ref_url="https://www.suse.com/security/cve/CVE-2023-38180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4644.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4644.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-35390/">CVE-2023-35390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35390">CVE-2023-35390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38180/">CVE-2023-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38180">CVE-2023-38180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806792" comment="aspnetcore-runtime-6.0-6.0.21-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806793" comment="aspnetcore-targeting-pack-6.0-6.0.21-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806794" comment="dotnet-apphost-pack-6.0-6.0.21-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806795" comment="dotnet-hostfxr-6.0-6.0.21-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806796" comment="dotnet-runtime-6.0-6.0.21-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806797" comment="dotnet-sdk-6.0-6.0.121-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806798" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806799" comment="dotnet-targeting-pack-6.0-6.0.21-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806800" comment="dotnet-templates-6.0-6.0.121-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3907" version="1" class="patch">
	<metadata>
		<title>security update for cups (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-32360" ref_url="https://www.suse.com/security/cve/CVE-2023-32360/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4838.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4838.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32360/">CVE-2023-32360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32360">CVE-2023-32360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806801" comment="cups-2.3.3op2-16.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806802" comment="cups-client-2.3.3op2-16.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806803" comment="cups-devel-2.3.3op2-16.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806804" comment="cups-filesystem-2.3.3op2-16.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806805" comment="cups-ipptool-2.3.3op2-16.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806806" comment="cups-libs-2.3.3op2-16.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806807" comment="cups-lpd-2.3.3op2-16.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806808" comment="cups-printerapp-2.3.3op2-16.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3908" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4955.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4955.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806809" comment="thunderbird-102.15.0-1.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3909" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4958.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4958.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806810" comment="firefox-102.15.0-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806811" comment="firefox-x11-102.15.0-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3910" version="1" class="patch">
	<metadata>
		<title>security update for flac (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-22219" ref_url="https://www.suse.com/security/cve/CVE-2020-22219/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5048.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5048.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22219/">CVE-2020-22219 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22219">CVE-2020-22219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806812" comment="flac-1.3.3-10.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806813" comment="flac-devel-1.3.3-10.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806814" comment="flac-libs-1.3.3-10.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3911" version="1" class="patch">
	<metadata>
		<title>security update for dmidecode (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-30630" ref_url="https://www.suse.com/security/cve/CVE-2023-30630/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5061.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5061.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-30630/">CVE-2023-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30630">CVE-2023-30630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806815" comment="dmidecode-3.3-7.el9_2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3912" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-50661" ref_url="https://www.suse.com/security/cve/CVE-2022-50661/" source="CVE"/>
		<reference ref_id="CVE-2023-1637" ref_url="https://www.suse.com/security/cve/CVE-2023-1637/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-21102" ref_url="https://www.suse.com/security/cve/CVE-2023-21102/" source="CVE"/>
		<reference ref_id="CVE-2023-31248" ref_url="https://www.suse.com/security/cve/CVE-2023-31248/" source="CVE"/>
		<reference ref_id="CVE-2023-3390" ref_url="https://www.suse.com/security/cve/CVE-2023-3390/" source="CVE"/>
		<reference ref_id="CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001/" source="CVE"/>
		<reference ref_id="CVE-2023-3610" ref_url="https://www.suse.com/security/cve/CVE-2023-3610/" source="CVE"/>
		<reference ref_id="CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776/" source="CVE"/>
		<reference ref_id="CVE-2023-4004" ref_url="https://www.suse.com/security/cve/CVE-2023-4004/" source="CVE"/>
		<reference ref_id="CVE-2023-4147" ref_url="https://www.suse.com/security/cve/CVE-2023-4147/" source="CVE"/>
		<reference ref_id="CVE-2023-44466" ref_url="https://www.suse.com/security/cve/CVE-2023-44466/" source="CVE"/>
		<reference ref_id="CVE-2023-53383" ref_url="https://www.suse.com/security/cve/CVE-2023-53383/" source="CVE"/>
		<reference ref_id="CVE-2023-53556" ref_url="https://www.suse.com/security/cve/CVE-2023-53556/" source="CVE"/>
		<reference ref_id="CVE-2023-53769" ref_url="https://www.suse.com/security/cve/CVE-2023-53769/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5069.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5069.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50661/">CVE-2022-50661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50661">CVE-2022-50661 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1637/">CVE-2023-1637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1637">CVE-2023-1637 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21102/">CVE-2023-21102 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21102">CVE-2023-21102 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31248/">CVE-2023-31248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3390/">CVE-2023-3390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3610/">CVE-2023-3610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4004/">CVE-2023-4004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4147/">CVE-2023-4147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-44466/">CVE-2023-44466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44466">CVE-2023-44466 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53383/">CVE-2023-53383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53383">CVE-2023-53383 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53556/">CVE-2023-53556 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53556">CVE-2023-53556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53769/">CVE-2023-53769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53769">CVE-2023-53769 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3913" version="1" class="patch">
	<metadata>
		<title>security update for libcap (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-2602" ref_url="https://www.suse.com/security/cve/CVE-2023-2602/" source="CVE"/>
		<reference ref_id="CVE-2023-2603" ref_url="https://www.suse.com/security/cve/CVE-2023-2603/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5071.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5071.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2602/">CVE-2023-2602 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2602">CVE-2023-2602 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2603/">CVE-2023-2603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2603">CVE-2023-2603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806843" comment="libcap-2.48-9.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806844" comment="libcap-devel-2.48-9.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3914" version="1" class="patch">
	<metadata>
		<title>security update for keylime (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-38200" ref_url="https://www.suse.com/security/cve/CVE-2023-38200/" source="CVE"/>
		<reference ref_id="CVE-2023-38201" ref_url="https://www.suse.com/security/cve/CVE-2023-38201/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5080.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5080.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38200/">CVE-2023-38200 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38200">CVE-2023-38200 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-38201/">CVE-2023-38201 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38201">CVE-2023-38201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806845" comment="keylime-6.5.2-6.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806846" comment="keylime-base-6.5.2-6.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806847" comment="keylime-registrar-6.5.2-6.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806848" comment="keylime-selinux-6.5.2-6.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806849" comment="keylime-tenant-6.5.2-6.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806850" comment="keylime-verifier-6.5.2-6.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806851" comment="python3-keylime-6.5.2-6.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3915" version="1" class="patch">
	<metadata>
		<title>security update for librsvg2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-38633" ref_url="https://www.suse.com/security/cve/CVE-2023-38633/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5081.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5081.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38633/">CVE-2023-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38633">CVE-2023-38633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806852" comment="librsvg2-2.50.7-1.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806853" comment="librsvg2-devel-2.50.7-1.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806854" comment="librsvg2-tools-2.50.7-1.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3916" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-3354" ref_url="https://www.suse.com/security/cve/CVE-2023-3354/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5094.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5094.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3354/">CVE-2023-3354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3354">CVE-2023-3354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806855" comment="qemu-guest-agent-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806856" comment="qemu-img-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806857" comment="qemu-kvm-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806858" comment="qemu-kvm-audio-pa-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806859" comment="qemu-kvm-block-curl-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806860" comment="qemu-kvm-block-rbd-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806861" comment="qemu-kvm-common-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806862" comment="qemu-kvm-core-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806863" comment="qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806864" comment="qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806865" comment="qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806866" comment="qemu-kvm-device-usb-host-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806867" comment="qemu-kvm-device-usb-redirect-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806868" comment="qemu-kvm-docs-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806869" comment="qemu-kvm-tools-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806870" comment="qemu-kvm-ui-egl-headless-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806871" comment="qemu-kvm-ui-opengl-7.2.0-14.el9_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806872" comment="qemu-pr-helper-7.2.0-14.el9_2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3917" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-36799" ref_url="https://www.suse.com/security/cve/CVE-2023-36799/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5143.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5143.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36799/">CVE-2023-36799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36799">CVE-2023-36799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806873" comment="aspnetcore-runtime-6.0-6.0.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806874" comment="aspnetcore-targeting-pack-6.0-6.0.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806875" comment="dotnet-apphost-pack-6.0-6.0.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806876" comment="dotnet-hostfxr-6.0-6.0.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806877" comment="dotnet-runtime-6.0-6.0.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806878" comment="dotnet-sdk-6.0-6.0.122-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806879" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806880" comment="dotnet-targeting-pack-6.0-6.0.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806881" comment="dotnet-templates-6.0-6.0.122-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3918" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-36799" ref_url="https://www.suse.com/security/cve/CVE-2023-36799/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5146.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5146.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36799/">CVE-2023-36799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36799">CVE-2023-36799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806882" comment="aspnetcore-runtime-7.0-7.0.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806883" comment="aspnetcore-targeting-pack-7.0-7.0.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806884" comment="dotnet-apphost-pack-7.0-7.0.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806885" comment="dotnet-host-7.0.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806886" comment="dotnet-hostfxr-7.0-7.0.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806887" comment="dotnet-runtime-7.0-7.0.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806888" comment="dotnet-sdk-7.0-7.0.111-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806889" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806890" comment="dotnet-targeting-pack-7.0-7.0.11-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806891" comment="dotnet-templates-7.0-7.0.111-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806892" comment="netstandard-targeting-pack-2.1-7.0.111-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3919" version="1" class="patch">
	<metadata>
		<title>security update for frr (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-38802" ref_url="https://www.suse.com/security/cve/CVE-2023-38802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5194.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5194.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38802/">CVE-2023-38802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38802">CVE-2023-38802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806893" comment="frr-8.3.1-5.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806894" comment="frr-selinux-8.3.1-5.el9_2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3920" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="CVE-2023-5129" ref_url="https://www.suse.com/security/cve/CVE-2023-5129/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5200.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5200.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5129/">CVE-2023-5129 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5129">CVE-2023-5129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806895" comment="firefox-102.15.1-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806896" comment="firefox-x11-102.15.1-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3921" version="1" class="patch">
	<metadata>
		<title>security update for libwebp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="CVE-2023-5129" ref_url="https://www.suse.com/security/cve/CVE-2023-5129/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5214.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5214.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5129/">CVE-2023-5129 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5129">CVE-2023-5129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806897" comment="libwebp-1.2.0-7.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806898" comment="libwebp-devel-1.2.0-7.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806899" comment="libwebp-tools-1.2.0-7.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3922" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="CVE-2023-5129" ref_url="https://www.suse.com/security/cve/CVE-2023-5129/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5224.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5224.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5129/">CVE-2023-5129 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5129">CVE-2023-5129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806900" comment="thunderbird-102.15.1-1.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3923" version="1" class="patch">
	<metadata>
		<title>security update for open-vm-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-20900" ref_url="https://www.suse.com/security/cve/CVE-2023-20900/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5313.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5313.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20900/">CVE-2023-20900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806901" comment="open-vm-tools-12.1.5-1.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806902" comment="open-vm-tools-desktop-12.1.5-1.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806903" comment="open-vm-tools-salt-minion-12.1.5-1.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806904" comment="open-vm-tools-sdmp-12.1.5-1.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806905" comment="open-vm-tools-test-12.1.5-1.el9_2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3924" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-25883" ref_url="https://www.suse.com/security/cve/CVE-2022-25883/" source="CVE"/>
		<reference ref_id="CVE-2023-32002" ref_url="https://www.suse.com/security/cve/CVE-2023-32002/" source="CVE"/>
		<reference ref_id="CVE-2023-32006" ref_url="https://www.suse.com/security/cve/CVE-2023-32006/" source="CVE"/>
		<reference ref_id="CVE-2023-32559" ref_url="https://www.suse.com/security/cve/CVE-2023-32559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5363.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5363.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-25883/">CVE-2022-25883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25883">CVE-2022-25883 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-32002/">CVE-2023-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32002">CVE-2023-32002 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32006/">CVE-2023-32006 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32006">CVE-2023-32006 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32559/">CVE-2023-32559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32559">CVE-2023-32559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806906" comment="nodejs-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806907" comment="nodejs-devel-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806908" comment="nodejs-docs-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806909" comment="nodejs-full-i18n-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806910" comment="nodejs-nodemon-3.0.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806911" comment="npm-9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3925" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5434.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5434.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806912" comment="firefox-115.3.1-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806913" comment="firefox-x11-115.3.1-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3926" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5435.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5435.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806914" comment="thunderbird-115.3.1-1.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3927" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4527" ref_url="https://www.suse.com/security/cve/CVE-2023-4527/" source="CVE"/>
		<reference ref_id="CVE-2023-4806" ref_url="https://www.suse.com/security/cve/CVE-2023-4806/" source="CVE"/>
		<reference ref_id="CVE-2023-4813" ref_url="https://www.suse.com/security/cve/CVE-2023-4813/" source="CVE"/>
		<reference ref_id="CVE-2023-4911" ref_url="https://www.suse.com/security/cve/CVE-2023-4911/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5453.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5453.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4527/">CVE-2023-4527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4527">CVE-2023-4527 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4806/">CVE-2023-4806 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4806">CVE-2023-4806 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4813/">CVE-2023-4813 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4813">CVE-2023-4813 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4911/">CVE-2023-4911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4911">CVE-2023-4911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806915" comment="glibc-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806916" comment="glibc-all-langpacks-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806917" comment="glibc-benchtests-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806918" comment="glibc-common-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806919" comment="glibc-devel-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806920" comment="glibc-doc-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806921" comment="glibc-gconv-extra-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806922" comment="glibc-headers-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806923" comment="glibc-langpack-aa-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806924" comment="glibc-langpack-af-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806925" comment="glibc-langpack-agr-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806926" comment="glibc-langpack-ak-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806927" comment="glibc-langpack-am-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806928" comment="glibc-langpack-an-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806929" comment="glibc-langpack-anp-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806930" comment="glibc-langpack-ar-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806931" comment="glibc-langpack-as-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806932" comment="glibc-langpack-ast-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806933" comment="glibc-langpack-ayc-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806934" comment="glibc-langpack-az-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806935" comment="glibc-langpack-be-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806936" comment="glibc-langpack-bem-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806937" comment="glibc-langpack-ber-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806938" comment="glibc-langpack-bg-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806939" comment="glibc-langpack-bhb-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806940" comment="glibc-langpack-bho-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806941" comment="glibc-langpack-bi-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806942" comment="glibc-langpack-bn-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806943" comment="glibc-langpack-bo-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806944" comment="glibc-langpack-br-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806945" comment="glibc-langpack-brx-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806946" comment="glibc-langpack-bs-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806947" comment="glibc-langpack-byn-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806948" comment="glibc-langpack-ca-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806949" comment="glibc-langpack-ce-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806950" comment="glibc-langpack-chr-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806951" comment="glibc-langpack-ckb-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806952" comment="glibc-langpack-cmn-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806953" comment="glibc-langpack-crh-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806954" comment="glibc-langpack-cs-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806955" comment="glibc-langpack-csb-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806956" comment="glibc-langpack-cv-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806957" comment="glibc-langpack-cy-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806958" comment="glibc-langpack-da-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806959" comment="glibc-langpack-de-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806960" comment="glibc-langpack-doi-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806961" comment="glibc-langpack-dsb-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806962" comment="glibc-langpack-dv-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806963" comment="glibc-langpack-dz-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806964" comment="glibc-langpack-el-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806965" comment="glibc-langpack-en-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806966" comment="glibc-langpack-eo-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806967" comment="glibc-langpack-es-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806968" comment="glibc-langpack-et-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806969" comment="glibc-langpack-eu-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806970" comment="glibc-langpack-fa-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806971" comment="glibc-langpack-ff-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806972" comment="glibc-langpack-fi-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806973" comment="glibc-langpack-fil-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806974" comment="glibc-langpack-fo-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806975" comment="glibc-langpack-fr-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806976" comment="glibc-langpack-fur-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806977" comment="glibc-langpack-fy-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806978" comment="glibc-langpack-ga-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806979" comment="glibc-langpack-gd-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806980" comment="glibc-langpack-gez-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806981" comment="glibc-langpack-gl-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806982" comment="glibc-langpack-gu-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806983" comment="glibc-langpack-gv-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806984" comment="glibc-langpack-ha-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806985" comment="glibc-langpack-hak-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806986" comment="glibc-langpack-he-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806987" comment="glibc-langpack-hi-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806988" comment="glibc-langpack-hif-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806989" comment="glibc-langpack-hne-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806990" comment="glibc-langpack-hr-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806991" comment="glibc-langpack-hsb-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806992" comment="glibc-langpack-ht-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806993" comment="glibc-langpack-hu-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806994" comment="glibc-langpack-hy-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806995" comment="glibc-langpack-ia-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806996" comment="glibc-langpack-id-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806997" comment="glibc-langpack-ig-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806998" comment="glibc-langpack-ik-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806999" comment="glibc-langpack-is-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807000" comment="glibc-langpack-it-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807001" comment="glibc-langpack-iu-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807002" comment="glibc-langpack-ja-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807003" comment="glibc-langpack-ka-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807004" comment="glibc-langpack-kab-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807005" comment="glibc-langpack-kk-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807006" comment="glibc-langpack-kl-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807007" comment="glibc-langpack-km-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807008" comment="glibc-langpack-kn-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807009" comment="glibc-langpack-ko-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807010" comment="glibc-langpack-kok-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807011" comment="glibc-langpack-ks-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807012" comment="glibc-langpack-ku-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807013" comment="glibc-langpack-kw-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807014" comment="glibc-langpack-ky-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807015" comment="glibc-langpack-lb-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807016" comment="glibc-langpack-lg-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807017" comment="glibc-langpack-li-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807018" comment="glibc-langpack-lij-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807019" comment="glibc-langpack-ln-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807020" comment="glibc-langpack-lo-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807021" comment="glibc-langpack-lt-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807022" comment="glibc-langpack-lv-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807023" comment="glibc-langpack-lzh-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807024" comment="glibc-langpack-mag-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807025" comment="glibc-langpack-mai-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807026" comment="glibc-langpack-mfe-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807027" comment="glibc-langpack-mg-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807028" comment="glibc-langpack-mhr-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807029" comment="glibc-langpack-mi-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807030" comment="glibc-langpack-miq-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807031" comment="glibc-langpack-mjw-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807032" comment="glibc-langpack-mk-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807033" comment="glibc-langpack-ml-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807034" comment="glibc-langpack-mn-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807035" comment="glibc-langpack-mni-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807036" comment="glibc-langpack-mnw-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807037" comment="glibc-langpack-mr-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807038" comment="glibc-langpack-ms-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807039" comment="glibc-langpack-mt-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807040" comment="glibc-langpack-my-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807041" comment="glibc-langpack-nan-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807042" comment="glibc-langpack-nb-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807043" comment="glibc-langpack-nds-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807044" comment="glibc-langpack-ne-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807045" comment="glibc-langpack-nhn-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807046" comment="glibc-langpack-niu-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807047" comment="glibc-langpack-nl-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807048" comment="glibc-langpack-nn-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807049" comment="glibc-langpack-nr-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807050" comment="glibc-langpack-nso-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807051" comment="glibc-langpack-oc-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807052" comment="glibc-langpack-om-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807053" comment="glibc-langpack-or-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807054" comment="glibc-langpack-os-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807055" comment="glibc-langpack-pa-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807056" comment="glibc-langpack-pap-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807057" comment="glibc-langpack-pl-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807058" comment="glibc-langpack-ps-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807059" comment="glibc-langpack-pt-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807060" comment="glibc-langpack-quz-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807061" comment="glibc-langpack-raj-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807062" comment="glibc-langpack-ro-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807063" comment="glibc-langpack-ru-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807064" comment="glibc-langpack-rw-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807065" comment="glibc-langpack-sa-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807066" comment="glibc-langpack-sah-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807067" comment="glibc-langpack-sat-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807068" comment="glibc-langpack-sc-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807069" comment="glibc-langpack-sd-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807070" comment="glibc-langpack-se-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807071" comment="glibc-langpack-sgs-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807072" comment="glibc-langpack-shn-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807073" comment="glibc-langpack-shs-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807074" comment="glibc-langpack-si-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807075" comment="glibc-langpack-sid-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807076" comment="glibc-langpack-sk-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807077" comment="glibc-langpack-sl-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807078" comment="glibc-langpack-sm-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807079" comment="glibc-langpack-so-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807080" comment="glibc-langpack-sq-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807081" comment="glibc-langpack-sr-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807082" comment="glibc-langpack-ss-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807083" comment="glibc-langpack-st-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807084" comment="glibc-langpack-sv-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807085" comment="glibc-langpack-sw-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807086" comment="glibc-langpack-szl-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807087" comment="glibc-langpack-ta-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807088" comment="glibc-langpack-tcy-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807089" comment="glibc-langpack-te-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807090" comment="glibc-langpack-tg-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807091" comment="glibc-langpack-th-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807092" comment="glibc-langpack-the-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807093" comment="glibc-langpack-ti-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807094" comment="glibc-langpack-tig-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807095" comment="glibc-langpack-tk-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807096" comment="glibc-langpack-tl-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807097" comment="glibc-langpack-tn-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807098" comment="glibc-langpack-to-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807099" comment="glibc-langpack-tpi-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807100" comment="glibc-langpack-tr-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807101" comment="glibc-langpack-ts-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807102" comment="glibc-langpack-tt-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807103" comment="glibc-langpack-ug-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807104" comment="glibc-langpack-uk-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807105" comment="glibc-langpack-unm-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807106" comment="glibc-langpack-ur-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807107" comment="glibc-langpack-uz-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807108" comment="glibc-langpack-ve-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807109" comment="glibc-langpack-vi-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807110" comment="glibc-langpack-wa-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807111" comment="glibc-langpack-wae-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807112" comment="glibc-langpack-wal-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807113" comment="glibc-langpack-wo-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807114" comment="glibc-langpack-xh-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807115" comment="glibc-langpack-yi-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807116" comment="glibc-langpack-yo-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807117" comment="glibc-langpack-yue-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807118" comment="glibc-langpack-yuw-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807119" comment="glibc-langpack-zh-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807120" comment="glibc-langpack-zu-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807121" comment="glibc-locale-source-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807122" comment="glibc-minimal-langpack-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807123" comment="glibc-nss-devel-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807124" comment="glibc-static-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807125" comment="glibc-utils-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807126" comment="libnsl-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807127" comment="nscd-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807128" comment="nss_db-2.34-60.el9_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807129" comment="nss_hesiod-2.34-60.el9_2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3928" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5456.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5456.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807130" comment="python3.11-3.11.2-2.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807131" comment="python3.11-debug-3.11.2-2.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807132" comment="python3.11-devel-3.11.2-2.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807133" comment="python3.11-idle-3.11.2-2.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807134" comment="python3.11-libs-3.11.2-2.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807135" comment="python3.11-test-3.11.2-2.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807136" comment="python3.11-tkinter-3.11.2-2.el9_2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3929" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-36664" ref_url="https://www.suse.com/security/cve/CVE-2023-36664/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5459.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5459.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36664/">CVE-2023-36664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36664">CVE-2023-36664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807137" comment="ghostscript-9.54.0-10.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807138" comment="ghostscript-doc-9.54.0-10.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807139" comment="ghostscript-tools-dvipdf-9.54.0-10.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807140" comment="ghostscript-tools-fonts-9.54.0-10.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807141" comment="ghostscript-tools-printing-9.54.0-10.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807142" comment="ghostscript-x11-9.54.0-10.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807143" comment="libgs-9.54.0-10.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807144" comment="libgs-devel-9.54.0-10.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3930" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5462.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5462.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807145" comment="python-unversioned-command-3.9.16-1.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807146" comment="python3-3.9.16-1.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807147" comment="python3-debug-3.9.16-1.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807148" comment="python3-devel-3.9.16-1.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807149" comment="python3-idle-3.9.16-1.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807150" comment="python3-libs-3.9.16-1.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807151" comment="python3-test-3.9.16-1.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807152" comment="python3-tkinter-3.9.16-1.el9_2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3931" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-32002" ref_url="https://www.suse.com/security/cve/CVE-2023-32002/" source="CVE"/>
		<reference ref_id="CVE-2023-32006" ref_url="https://www.suse.com/security/cve/CVE-2023-32006/" source="CVE"/>
		<reference ref_id="CVE-2023-32559" ref_url="https://www.suse.com/security/cve/CVE-2023-32559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5532.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5532.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-32002/">CVE-2023-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32002">CVE-2023-32002 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32006/">CVE-2023-32006 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32006">CVE-2023-32006 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32559/">CVE-2023-32559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32559">CVE-2023-32559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807153" comment="nodejs-16.20.2-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807154" comment="nodejs-docs-16.20.2-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807155" comment="nodejs-full-i18n-16.20.2-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807156" comment="nodejs-libs-16.20.2-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807157" comment="npm-8.19.4-1.16.20.2.1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3932" version="1" class="patch">
	<metadata>
		<title>security update for libvpx (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44488" ref_url="https://www.suse.com/security/cve/CVE-2023-44488/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5539.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5539.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44488/">CVE-2023-44488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44488">CVE-2023-44488 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807158" comment="libvpx-1.9.0-7.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807159" comment="libvpx-devel-1.9.0-7.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3933" version="1" class="patch">
	<metadata>
		<title>security update for galera (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-32081" ref_url="https://www.suse.com/security/cve/CVE-2022-32081/" source="CVE"/>
		<reference ref_id="CVE-2022-32082" ref_url="https://www.suse.com/security/cve/CVE-2022-32082/" source="CVE"/>
		<reference ref_id="CVE-2022-32084" ref_url="https://www.suse.com/security/cve/CVE-2022-32084/" source="CVE"/>
		<reference ref_id="CVE-2022-32089" ref_url="https://www.suse.com/security/cve/CVE-2022-32089/" source="CVE"/>
		<reference ref_id="CVE-2022-32091" ref_url="https://www.suse.com/security/cve/CVE-2022-32091/" source="CVE"/>
		<reference ref_id="CVE-2022-38791" ref_url="https://www.suse.com/security/cve/CVE-2022-38791/" source="CVE"/>
		<reference ref_id="CVE-2022-47015" ref_url="https://www.suse.com/security/cve/CVE-2022-47015/" source="CVE"/>
		<reference ref_id="CVE-2023-5157" ref_url="https://www.suse.com/security/cve/CVE-2023-5157/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5684.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5684.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32081/">CVE-2022-32081 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32081">CVE-2022-32081 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32082/">CVE-2022-32082 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32082">CVE-2022-32082 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32084/">CVE-2022-32084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32084">CVE-2022-32084 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32089/">CVE-2022-32089 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32089">CVE-2022-32089 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32091/">CVE-2022-32091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32091">CVE-2022-32091 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38791/">CVE-2022-38791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38791">CVE-2022-38791 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-47015/">CVE-2022-47015 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47015">CVE-2022-47015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5157/">CVE-2023-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5157">CVE-2023-5157 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807680" comment="galera-26.4.14-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807681" comment="mariadb-10.5.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807682" comment="mariadb-backup-10.5.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807683" comment="mariadb-common-10.5.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807684" comment="mariadb-devel-10.5.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807685" comment="mariadb-embedded-10.5.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807686" comment="mariadb-embedded-devel-10.5.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807687" comment="mariadb-errmsg-10.5.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807688" comment="mariadb-gssapi-server-10.5.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807689" comment="mariadb-oqgraph-engine-10.5.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807690" comment="mariadb-pam-10.5.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807691" comment="mariadb-server-10.5.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807692" comment="mariadb-server-galera-10.5.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807693" comment="mariadb-server-utils-10.5.22-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807694" comment="mariadb-test-10.5.22-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3934" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-3341" ref_url="https://www.suse.com/security/cve/CVE-2023-3341/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5689.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5689.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3341/">CVE-2023-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3341">CVE-2023-3341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807160" comment="bind-9.16.23-11.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807161" comment="bind-chroot-9.16.23-11.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807162" comment="bind-devel-9.16.23-11.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807163" comment="bind-dnssec-doc-9.16.23-11.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807164" comment="bind-dnssec-utils-9.16.23-11.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807165" comment="bind-doc-9.16.23-11.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807166" comment="bind-libs-9.16.23-11.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807167" comment="bind-license-9.16.23-11.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807168" comment="bind-utils-9.16.23-11.el9_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807169" comment="python3-bind-9.16.23-11.el9_2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3935" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5708.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5708.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807170" comment="aspnetcore-runtime-6.0-6.0.23-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807171" comment="aspnetcore-targeting-pack-6.0-6.0.23-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807172" comment="dotnet-apphost-pack-6.0-6.0.23-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807173" comment="dotnet-hostfxr-6.0-6.0.23-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807174" comment="dotnet-runtime-6.0-6.0.23-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807175" comment="dotnet-sdk-6.0-6.0.123-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807176" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807177" comment="dotnet-targeting-pack-6.0-6.0.23-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807178" comment="dotnet-templates-6.0-6.0.123-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3936" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5711.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5711.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807179" comment="nginx-1.20.1-14.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807180" comment="nginx-all-modules-1.20.1-14.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807181" comment="nginx-core-1.20.1-14.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807182" comment="nginx-filesystem-1.20.1-14.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807183" comment="nginx-mod-devel-1.20.1-14.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807184" comment="nginx-mod-http-image-filter-1.20.1-14.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807185" comment="nginx-mod-http-perl-1.20.1-14.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807186" comment="nginx-mod-http-xslt-filter-1.20.1-14.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807187" comment="nginx-mod-mail-1.20.1-14.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807188" comment="nginx-mod-stream-1.20.1-14.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3937" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-40433" ref_url="https://www.suse.com/security/cve/CVE-2022-40433/" source="CVE"/>
		<reference ref_id="CVE-2023-22067" ref_url="https://www.suse.com/security/cve/CVE-2023-22067/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5733.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5733.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40433/">CVE-2022-40433 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40433">CVE-2022-40433 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22067/">CVE-2023-22067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22067">CVE-2023-22067 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807189" comment="java-1.8.0-openjdk-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807190" comment="java-1.8.0-openjdk-demo-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807191" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807192" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807193" comment="java-1.8.0-openjdk-devel-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807194" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807195" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807196" comment="java-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807197" comment="java-1.8.0-openjdk-headless-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807198" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807199" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807200" comment="java-1.8.0-openjdk-javadoc-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807201" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807202" comment="java-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807203" comment="java-1.8.0-openjdk-src-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807204" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807205" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3938" version="1" class="patch">
	<metadata>
		<title>security update for go-toolset (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5738.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5738.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807206" comment="go-toolset-1.19.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807207" comment="golang-1.19.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807208" comment="golang-bin-1.19.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807209" comment="golang-docs-1.19.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807210" comment="golang-misc-1.19.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807211" comment="golang-race-1.19.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807212" comment="golang-src-1.19.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807213" comment="golang-tests-1.19.13-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3939" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5744.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5744.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807214" comment="java-11-openjdk-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807215" comment="java-11-openjdk-demo-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807216" comment="java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807217" comment="java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807218" comment="java-11-openjdk-devel-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807219" comment="java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807220" comment="java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807221" comment="java-11-openjdk-fastdebug-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807222" comment="java-11-openjdk-headless-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807223" comment="java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807224" comment="java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807225" comment="java-11-openjdk-javadoc-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807226" comment="java-11-openjdk-javadoc-zip-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807227" comment="java-11-openjdk-jmods-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807228" comment="java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807229" comment="java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807230" comment="java-11-openjdk-slowdebug-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807231" comment="java-11-openjdk-src-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807232" comment="java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807233" comment="java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807234" comment="java-11-openjdk-static-libs-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807235" comment="java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807236" comment="java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3940" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5749.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5749.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807237" comment="aspnetcore-runtime-7.0-7.0.12-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807238" comment="aspnetcore-targeting-pack-7.0-7.0.12-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807239" comment="dotnet-apphost-pack-7.0-7.0.12-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807240" comment="dotnet-host-7.0.12-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807241" comment="dotnet-hostfxr-7.0-7.0.12-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807242" comment="dotnet-runtime-7.0-7.0.12-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807243" comment="dotnet-sdk-7.0-7.0.112-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807244" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807245" comment="dotnet-targeting-pack-7.0-7.0.12-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807246" comment="dotnet-templates-7.0-7.0.112-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807247" comment="netstandard-targeting-pack-2.1-7.0.112-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3941" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-22025" ref_url="https://www.suse.com/security/cve/CVE-2023-22025/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5753.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5753.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22025/">CVE-2023-22025 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22025">CVE-2023-22025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807248" comment="java-17-openjdk-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807249" comment="java-17-openjdk-demo-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807250" comment="java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807251" comment="java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807252" comment="java-17-openjdk-devel-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807253" comment="java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807254" comment="java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807255" comment="java-17-openjdk-fastdebug-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807256" comment="java-17-openjdk-headless-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807257" comment="java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807258" comment="java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807259" comment="java-17-openjdk-javadoc-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807260" comment="java-17-openjdk-javadoc-zip-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807261" comment="java-17-openjdk-jmods-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807262" comment="java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807263" comment="java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807264" comment="java-17-openjdk-slowdebug-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807265" comment="java-17-openjdk-src-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807266" comment="java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807267" comment="java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807268" comment="java-17-openjdk-static-libs-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807269" comment="java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807270" comment="java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3942" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-38545" ref_url="https://www.suse.com/security/cve/CVE-2023-38545/" source="CVE"/>
		<reference ref_id="CVE-2023-38546" ref_url="https://www.suse.com/security/cve/CVE-2023-38546/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5763.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5763.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38545/">CVE-2023-38545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-38546/">CVE-2023-38546 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807271" comment="curl-7.76.1-23.el9_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807272" comment="curl-minimal-7.76.1-23.el9_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807273" comment="libcurl-7.76.1-23.el9_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807274" comment="libcurl-devel-7.76.1-23.el9_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807275" comment="libcurl-minimal-7.76.1-23.el9_2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3943" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5765.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5765.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807276" comment="nodejs-16.20.2-3.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807277" comment="nodejs-docs-16.20.2-3.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807278" comment="nodejs-full-i18n-16.20.2-3.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807279" comment="nodejs-libs-16.20.2-3.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807280" comment="npm-8.19.4-1.16.20.2.3.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3944" version="1" class="patch">
	<metadata>
		<title>security update for nghttp2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5838.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5838.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807281" comment="libnghttp2-1.43.0-5.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807282" comment="libnghttp2-devel-1.43.0-5.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807283" comment="nghttp2-1.43.0-5.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3945" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-38552" ref_url="https://www.suse.com/security/cve/CVE-2023-38552/" source="CVE"/>
		<reference ref_id="CVE-2023-39333" ref_url="https://www.suse.com/security/cve/CVE-2023-39333/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45143" ref_url="https://www.suse.com/security/cve/CVE-2023-45143/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5849.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5849.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-38552/">CVE-2023-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38552">CVE-2023-38552 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-39333/">CVE-2023-39333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39333">CVE-2023-39333 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45143/">CVE-2023-45143 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45143">CVE-2023-45143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807284" comment="nodejs-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807285" comment="nodejs-devel-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807286" comment="nodejs-docs-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807287" comment="nodejs-full-i18n-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806910" comment="nodejs-nodemon-3.0.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807288" comment="npm-9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3946" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5867.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5867.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807289" comment="grafana-9.0.9-4.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3947" version="1" class="patch">
	<metadata>
		<title>security update for varnish (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5924.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5924.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807290" comment="varnish-6.6.2-3.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807291" comment="varnish-devel-6.6.2-3.el9_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807292" comment="varnish-docs-6.6.2-3.el9_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3948" version="1" class="patch">
	<metadata>
		<title>security update for php (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0567" ref_url="https://www.suse.com/security/cve/CVE-2023-0567/" source="CVE"/>
		<reference ref_id="CVE-2023-0568" ref_url="https://www.suse.com/security/cve/CVE-2023-0568/" source="CVE"/>
		<reference ref_id="CVE-2023-0662" ref_url="https://www.suse.com/security/cve/CVE-2023-0662/" source="CVE"/>
		<reference ref_id="CVE-2023-3247" ref_url="https://www.suse.com/security/cve/CVE-2023-3247/" source="CVE"/>
		<reference ref_id="CVE-2023-3823" ref_url="https://www.suse.com/security/cve/CVE-2023-3823/" source="CVE"/>
		<reference ref_id="CVE-2023-3824" ref_url="https://www.suse.com/security/cve/CVE-2023-3824/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5926.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5926.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0567/">CVE-2023-0567 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0567">CVE-2023-0567 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0568/">CVE-2023-0568 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0568">CVE-2023-0568 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0662/">CVE-2023-0662 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0662">CVE-2023-0662 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3247/">CVE-2023-3247 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3247">CVE-2023-3247 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3823/">CVE-2023-3823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3823">CVE-2023-3823 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3824/">CVE-2023-3824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3824">CVE-2023-3824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807293" comment="php-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807294" comment="php-bcmath-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807295" comment="php-cli-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807296" comment="php-common-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807297" comment="php-dba-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807298" comment="php-dbg-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807299" comment="php-devel-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807300" comment="php-embedded-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807301" comment="php-enchant-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807302" comment="php-ffi-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807303" comment="php-fpm-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807304" comment="php-gd-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807305" comment="php-gmp-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807306" comment="php-intl-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807307" comment="php-ldap-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807308" comment="php-mbstring-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807309" comment="php-mysqlnd-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807310" comment="php-odbc-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807311" comment="php-opcache-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807312" comment="php-pdo-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807313" comment="php-pgsql-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807314" comment="php-process-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807315" comment="php-snmp-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807316" comment="php-soap-8.0.30-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807317" comment="php-xml-8.0.30-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3949" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5929.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5929.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807318" comment="tomcat-9.0.62-11.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807319" comment="tomcat-admin-webapps-9.0.62-11.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807320" comment="tomcat-docs-webapp-9.0.62-11.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807321" comment="tomcat-el-3.0-api-9.0.62-11.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807322" comment="tomcat-jsp-2.3-api-9.0.62-11.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807323" comment="tomcat-lib-9.0.62-11.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807324" comment="tomcat-servlet-4.0-api-9.0.62-11.el9_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807325" comment="tomcat-webapps-9.0.62-11.el9_2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3950" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6120.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6120.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807326" comment="nginx-1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807327" comment="nginx-all-modules-1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807328" comment="nginx-core-1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807329" comment="nginx-filesystem-1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807330" comment="nginx-mod-devel-1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807331" comment="nginx-mod-http-image-filter-1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807332" comment="nginx-mod-http-perl-1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807333" comment="nginx-mod-http-xslt-filter-1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807334" comment="nginx-mod-mail-1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807335" comment="nginx-mod-stream-1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3951" version="1" class="patch">
	<metadata>
		<title>security update for libguestfs-winsupport (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-40284" ref_url="https://www.suse.com/security/cve/CVE-2022-40284/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6167.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6167.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40284/">CVE-2022-40284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40284">CVE-2022-40284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811012" comment="libguestfs-winsupport-9.2-2.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3952" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44488" ref_url="https://www.suse.com/security/cve/CVE-2023-44488/" source="CVE"/>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5732" ref_url="https://www.suse.com/security/cve/CVE-2023-5732/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6188.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6188.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44488/">CVE-2023-44488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44488">CVE-2023-44488 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5732/">CVE-2023-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5732">CVE-2023-5732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808826" comment="firefox-115.4.0-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808827" comment="firefox-x11-115.4.0-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3953" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44488" ref_url="https://www.suse.com/security/cve/CVE-2023-44488/" source="CVE"/>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5732" ref_url="https://www.suse.com/security/cve/CVE-2023-5732/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6191.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6191.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44488/">CVE-2023-44488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44488">CVE-2023-44488 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5732/">CVE-2023-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5732">CVE-2023-5732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809033" comment="thunderbird-115.4.1-1.el9_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3954" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-36799" ref_url="https://www.suse.com/security/cve/CVE-2023-36799/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6242.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6242.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36799/">CVE-2023-36799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36799">CVE-2023-36799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808828" comment="aspnetcore-runtime-6.0-6.0.24-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808829" comment="aspnetcore-targeting-pack-6.0-6.0.24-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808830" comment="dotnet-apphost-pack-6.0-6.0.24-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808831" comment="dotnet-hostfxr-6.0-6.0.24-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808832" comment="dotnet-runtime-6.0-6.0.24-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808833" comment="dotnet-sdk-6.0-6.0.124-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808834" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808835" comment="dotnet-targeting-pack-6.0-6.0.24-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808836" comment="dotnet-templates-6.0-6.0.124-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3955" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-36799" ref_url="https://www.suse.com/security/cve/CVE-2023-36799/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6246.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6246.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36799/">CVE-2023-36799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36799">CVE-2023-36799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808837" comment="aspnetcore-runtime-7.0-7.0.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808838" comment="aspnetcore-targeting-pack-7.0-7.0.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808839" comment="dotnet-apphost-pack-7.0-7.0.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808840" comment="dotnet-host-7.0.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808841" comment="dotnet-hostfxr-7.0-7.0.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808842" comment="dotnet-runtime-7.0-7.0.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808843" comment="dotnet-sdk-7.0-7.0.113-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808844" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808845" comment="dotnet-targeting-pack-7.0-7.0.13-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808846" comment="dotnet-templates-7.0-7.0.113-1.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808847" comment="netstandard-targeting-pack-2.1-7.0.113-1.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3956" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-43115" ref_url="https://www.suse.com/security/cve/CVE-2023-43115/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6265.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6265.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-43115/">CVE-2023-43115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43115">CVE-2023-43115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809000" comment="ghostscript-9.54.0-11.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809001" comment="ghostscript-doc-9.54.0-11.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809002" comment="ghostscript-tools-dvipdf-9.54.0-11.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809003" comment="ghostscript-tools-fonts-9.54.0-11.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809004" comment="ghostscript-tools-printing-9.54.0-11.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809005" comment="ghostscript-x11-9.54.0-11.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809006" comment="libgs-9.54.0-11.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809007" comment="libgs-devel-9.54.0-11.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3957" version="1" class="patch">
	<metadata>
		<title>security update for squid (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-46846" ref_url="https://www.suse.com/security/cve/CVE-2023-46846/" source="CVE"/>
		<reference ref_id="CVE-2023-46847" ref_url="https://www.suse.com/security/cve/CVE-2023-46847/" source="CVE"/>
		<reference ref_id="CVE-2023-46848" ref_url="https://www.suse.com/security/cve/CVE-2023-46848/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6266.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6266.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46846/">CVE-2023-46846 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46846">CVE-2023-46846 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46847/">CVE-2023-46847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46847">CVE-2023-46847 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46848/">CVE-2023-46848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46848">CVE-2023-46848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809008" comment="squid-5.5-5.el9_2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3958" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-38900" ref_url="https://www.suse.com/security/cve/CVE-2022-38900/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6316.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6316.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38900/">CVE-2022-38900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38900">CVE-2022-38900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813701" comment="pcs-0.11.6-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813702" comment="pcs-snmp-0.11.6-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3959" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-pip (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6324.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6324.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810780" comment="python3.11-pip-22.3.1-4.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810781" comment="python3.11-pip-wheel-22.3.1-4.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3960" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2019-14560" ref_url="https://www.suse.com/security/cve/CVE-2019-14560/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6330.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6330.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14560/">CVE-2019-14560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14560">CVE-2019-14560 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811013" comment="edk2-ovmf-20230524-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811014" comment="edk2-tools-20230524-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811015" comment="edk2-tools-doc-20230524-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3961" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6340.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6340.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811016" comment="xorg-x11-server-Xdmx-1.20.11-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811017" comment="xorg-x11-server-Xephyr-1.20.11-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811018" comment="xorg-x11-server-Xnest-1.20.11-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811019" comment="xorg-x11-server-Xorg-1.20.11-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811020" comment="xorg-x11-server-Xvfb-1.20.11-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811021" comment="xorg-x11-server-common-1.20.11-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811022" comment="xorg-x11-server-devel-1.20.11-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811023" comment="xorg-x11-server-source-1.20.11-19.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3962" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server-Xwayland (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6341.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6341.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810782" comment="xorg-x11-server-Xwayland-22.1.9-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3963" version="1" class="patch">
	<metadata>
		<title>security update for LibRaw (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-32142" ref_url="https://www.suse.com/security/cve/CVE-2021-32142/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6343.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6343.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-32142/">CVE-2021-32142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32142">CVE-2021-32142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810783" comment="LibRaw-0.20.2-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810784" comment="LibRaw-devel-0.20.2-6.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3964" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724/" source="CVE"/>
		<reference ref_id="CVE-2022-41725" ref_url="https://www.suse.com/security/cve/CVE-2022-41725/" source="CVE"/>
		<reference ref_id="CVE-2023-24534" ref_url="https://www.suse.com/security/cve/CVE-2023-24534/" source="CVE"/>
		<reference ref_id="CVE-2023-24536" ref_url="https://www.suse.com/security/cve/CVE-2023-24536/" source="CVE"/>
		<reference ref_id="CVE-2023-24537" ref_url="https://www.suse.com/security/cve/CVE-2023-24537/" source="CVE"/>
		<reference ref_id="CVE-2023-24538" ref_url="https://www.suse.com/security/cve/CVE-2023-24538/" source="CVE"/>
		<reference ref_id="CVE-2023-24539" ref_url="https://www.suse.com/security/cve/CVE-2023-24539/" source="CVE"/>
		<reference ref_id="CVE-2023-24540" ref_url="https://www.suse.com/security/cve/CVE-2023-24540/" source="CVE"/>
		<reference ref_id="CVE-2023-29400" ref_url="https://www.suse.com/security/cve/CVE-2023-29400/" source="CVE"/>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6363.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6363.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41725/">CVE-2022-41725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24534/">CVE-2023-24534 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24536/">CVE-2023-24536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24537/">CVE-2023-24537 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24538/">CVE-2023-24538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24539/">CVE-2023-24539 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-24540/">CVE-2023-24540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-29400/">CVE-2023-29400 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811024" comment="skopeo-1.13.3-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811025" comment="skopeo-tests-1.13.3-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3965" version="1" class="patch">
	<metadata>
		<title>security update for mod_auth_openidc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-23527" ref_url="https://www.suse.com/security/cve/CVE-2022-23527/" source="CVE"/>
		<reference ref_id="CVE-2023-28625" ref_url="https://www.suse.com/security/cve/CVE-2023-28625/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6365.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6365.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23527/">CVE-2022-23527 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23527">CVE-2022-23527 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28625/">CVE-2023-28625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28625">CVE-2023-28625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811026" comment="mod_auth_openidc-2.4.9.4-4.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3966" version="1" class="patch">
	<metadata>
		<title>security update for adwaita-qt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-32573" ref_url="https://www.suse.com/security/cve/CVE-2023-32573/" source="CVE"/>
		<reference ref_id="CVE-2023-33285" ref_url="https://www.suse.com/security/cve/CVE-2023-33285/" source="CVE"/>
		<reference ref_id="CVE-2023-34410" ref_url="https://www.suse.com/security/cve/CVE-2023-34410/" source="CVE"/>
		<reference ref_id="CVE-2023-37369" ref_url="https://www.suse.com/security/cve/CVE-2023-37369/" source="CVE"/>
		<reference ref_id="CVE-2023-38197" ref_url="https://www.suse.com/security/cve/CVE-2023-38197/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6369.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6369.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32573/">CVE-2023-32573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32573">CVE-2023-32573 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-33285/">CVE-2023-33285 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33285">CVE-2023-33285 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34410/">CVE-2023-34410 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34410">CVE-2023-34410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37369/">CVE-2023-37369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37369">CVE-2023-37369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38197/">CVE-2023-38197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38197">CVE-2023-38197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813867" comment="adwaita-qt5-1.4.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813868" comment="libadwaita-qt5-1.4.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813869" comment="python-qt5-rpm-macros-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813870" comment="python3-pyqt5-sip-12.11.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813871" comment="python3-qt5-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813872" comment="python3-qt5-base-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813873" comment="python3-qt5-devel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813874" comment="qgnomeplatform-0.9.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813875" comment="qt5-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813876" comment="qt5-assistant-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813877" comment="qt5-designer-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813878" comment="qt5-devel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813879" comment="qt5-doctools-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813880" comment="qt5-linguist-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813881" comment="qt5-qdbusviewer-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813882" comment="qt5-qt3d-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813883" comment="qt5-qt3d-devel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813884" comment="qt5-qt3d-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813885" comment="qt5-qt3d-examples-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813886" comment="qt5-qtbase-5.15.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813887" comment="qt5-qtbase-common-5.15.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813888" comment="qt5-qtbase-devel-5.15.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813889" comment="qt5-qtbase-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813890" comment="qt5-qtbase-examples-5.15.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813891" comment="qt5-qtbase-gui-5.15.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813892" comment="qt5-qtbase-mysql-5.15.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813893" comment="qt5-qtbase-odbc-5.15.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813894" comment="qt5-qtbase-postgresql-5.15.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813895" comment="qt5-qtbase-private-devel-5.15.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813896" comment="qt5-qtbase-static-5.15.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813897" comment="qt5-qtconnectivity-5.15.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813898" comment="qt5-qtconnectivity-devel-5.15.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813899" comment="qt5-qtconnectivity-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813900" comment="qt5-qtconnectivity-examples-5.15.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813901" comment="qt5-qtdeclarative-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813902" comment="qt5-qtdeclarative-devel-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813903" comment="qt5-qtdeclarative-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813904" comment="qt5-qtdeclarative-examples-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813905" comment="qt5-qtdeclarative-static-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813906" comment="qt5-qtdoc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813907" comment="qt5-qtgraphicaleffects-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813908" comment="qt5-qtgraphicaleffects-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813909" comment="qt5-qtimageformats-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813910" comment="qt5-qtimageformats-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813911" comment="qt5-qtlocation-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813912" comment="qt5-qtlocation-devel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813913" comment="qt5-qtlocation-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813914" comment="qt5-qtlocation-examples-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813915" comment="qt5-qtmultimedia-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813916" comment="qt5-qtmultimedia-devel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813917" comment="qt5-qtmultimedia-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813918" comment="qt5-qtmultimedia-examples-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813919" comment="qt5-qtquickcontrols-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813920" comment="qt5-qtquickcontrols-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813921" comment="qt5-qtquickcontrols-examples-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813922" comment="qt5-qtquickcontrols2-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813923" comment="qt5-qtquickcontrols2-devel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813924" comment="qt5-qtquickcontrols2-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813925" comment="qt5-qtquickcontrols2-examples-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813926" comment="qt5-qtscript-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813927" comment="qt5-qtscript-devel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813928" comment="qt5-qtscript-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813929" comment="qt5-qtscript-examples-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813930" comment="qt5-qtsensors-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813931" comment="qt5-qtsensors-devel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813932" comment="qt5-qtsensors-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813933" comment="qt5-qtsensors-examples-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813934" comment="qt5-qtserialbus-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813935" comment="qt5-qtserialbus-devel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813936" comment="qt5-qtserialbus-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813937" comment="qt5-qtserialbus-examples-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813938" comment="qt5-qtserialport-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813939" comment="qt5-qtserialport-devel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813940" comment="qt5-qtserialport-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813941" comment="qt5-qtserialport-examples-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813942" comment="qt5-qtsvg-5.15.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813943" comment="qt5-qtsvg-devel-5.15.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813944" comment="qt5-qtsvg-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813945" comment="qt5-qtsvg-examples-5.15.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813946" comment="qt5-qttools-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813947" comment="qt5-qttools-common-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813948" comment="qt5-qttools-devel-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813949" comment="qt5-qttools-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813950" comment="qt5-qttools-examples-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813951" comment="qt5-qttools-libs-designer-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813952" comment="qt5-qttools-libs-designercomponents-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813953" comment="qt5-qttools-libs-help-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813954" comment="qt5-qttools-static-5.15.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813955" comment="qt5-qttranslations-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813956" comment="qt5-qtwayland-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813957" comment="qt5-qtwayland-devel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813958" comment="qt5-qtwayland-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813959" comment="qt5-qtwayland-examples-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813960" comment="qt5-qtwebchannel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813961" comment="qt5-qtwebchannel-devel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813962" comment="qt5-qtwebchannel-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813963" comment="qt5-qtwebchannel-examples-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813964" comment="qt5-qtwebsockets-5.15.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813965" comment="qt5-qtwebsockets-devel-5.15.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813966" comment="qt5-qtwebsockets-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813967" comment="qt5-qtwebsockets-examples-5.15.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813968" comment="qt5-qtx11extras-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813969" comment="qt5-qtx11extras-devel-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813970" comment="qt5-qtx11extras-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813971" comment="qt5-qtxmlpatterns-5.15.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813972" comment="qt5-qtxmlpatterns-devel-5.15.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813973" comment="qt5-qtxmlpatterns-doc-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813974" comment="qt5-qtxmlpatterns-examples-5.15.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813975" comment="qt5-rpm-macros-5.15.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813976" comment="qt5-srpm-macros-5.15.9-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3967" version="1" class="patch">
	<metadata>
		<title>security update for cloud-init (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-1786" ref_url="https://www.suse.com/security/cve/CVE-2023-1786/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6371.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6371.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1786/">CVE-2023-1786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1786">CVE-2023-1786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813703" comment="cloud-init-23.1.1-11.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3968" version="1" class="patch">
	<metadata>
		<title>security update for gdb (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-3826" ref_url="https://www.suse.com/security/cve/CVE-2021-3826/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6372.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6372.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3826/">CVE-2021-3826 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3826">CVE-2021-3826 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810785" comment="gdb-10.2-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810786" comment="gdb-doc-10.2-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810787" comment="gdb-gdbserver-10.2-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810788" comment="gdb-headless-10.2-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810789" comment="gdb-minimal-10.2-11.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3969" version="1" class="patch">
	<metadata>
		<title>security update for runc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-43784" ref_url="https://www.suse.com/security/cve/CVE-2021-43784/" source="CVE"/>
		<reference ref_id="CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724/" source="CVE"/>
		<reference ref_id="CVE-2023-25809" ref_url="https://www.suse.com/security/cve/CVE-2023-25809/" source="CVE"/>
		<reference ref_id="CVE-2023-27561" ref_url="https://www.suse.com/security/cve/CVE-2023-27561/" source="CVE"/>
		<reference ref_id="CVE-2023-28642" ref_url="https://www.suse.com/security/cve/CVE-2023-28642/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6380.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6380.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43784/">CVE-2021-43784 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43784">CVE-2021-43784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25809/">CVE-2023-25809 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25809">CVE-2023-25809 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27561/">CVE-2023-27561 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27561">CVE-2023-27561 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-28642/">CVE-2023-28642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28642">CVE-2023-28642 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810790" comment="runc-1.1.9-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3970" version="1" class="patch">
	<metadata>
		<title>security update for liblouis (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-26767" ref_url="https://www.suse.com/security/cve/CVE-2023-26767/" source="CVE"/>
		<reference ref_id="CVE-2023-26768" ref_url="https://www.suse.com/security/cve/CVE-2023-26768/" source="CVE"/>
		<reference ref_id="CVE-2023-26769" ref_url="https://www.suse.com/security/cve/CVE-2023-26769/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6385.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6385.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26767/">CVE-2023-26767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26767">CVE-2023-26767 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26768/">CVE-2023-26768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26768">CVE-2023-26768 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26769/">CVE-2023-26769 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26769">CVE-2023-26769 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811027" comment="liblouis-3.16.1-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811028" comment="python3-louis-3.16.1-5.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3971" version="1" class="patch">
	<metadata>
		<title>security update for containernetworking-plugins (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724/" source="CVE"/>
		<reference ref_id="CVE-2022-41725" ref_url="https://www.suse.com/security/cve/CVE-2022-41725/" source="CVE"/>
		<reference ref_id="CVE-2023-24534" ref_url="https://www.suse.com/security/cve/CVE-2023-24534/" source="CVE"/>
		<reference ref_id="CVE-2023-24536" ref_url="https://www.suse.com/security/cve/CVE-2023-24536/" source="CVE"/>
		<reference ref_id="CVE-2023-24538" ref_url="https://www.suse.com/security/cve/CVE-2023-24538/" source="CVE"/>
		<reference ref_id="CVE-2023-24539" ref_url="https://www.suse.com/security/cve/CVE-2023-24539/" source="CVE"/>
		<reference ref_id="CVE-2023-24540" ref_url="https://www.suse.com/security/cve/CVE-2023-24540/" source="CVE"/>
		<reference ref_id="CVE-2023-29400" ref_url="https://www.suse.com/security/cve/CVE-2023-29400/" source="CVE"/>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6402.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6402.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41725/">CVE-2022-41725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24534/">CVE-2023-24534 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24536/">CVE-2023-24536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24538/">CVE-2023-24538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24539/">CVE-2023-24539 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-24540/">CVE-2023-24540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-29400/">CVE-2023-29400 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811029" comment="containernetworking-plugins-1.3.0-4.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3972" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-27522" ref_url="https://www.suse.com/security/cve/CVE-2023-27522/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6403.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6403.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-27522/">CVE-2023-27522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27522">CVE-2023-27522 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811030" comment="httpd-2.4.57-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811031" comment="httpd-core-2.4.57-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811032" comment="httpd-devel-2.4.57-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811033" comment="httpd-filesystem-2.4.57-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811034" comment="httpd-manual-2.4.57-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811035" comment="httpd-tools-2.4.57-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811036" comment="mod_http2-1.15.19-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811037" comment="mod_ldap-2.4.57-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811038" comment="mod_lua-2.4.57-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811039" comment="mod_proxy_html-2.4.57-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811040" comment="mod_session-2.4.57-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811041" comment="mod_ssl-2.4.57-5.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3973" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-3750" ref_url="https://www.suse.com/security/cve/CVE-2023-3750/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6409.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6409.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3750/">CVE-2023-3750 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3750">CVE-2023-3750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811042" comment="libvirt-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811043" comment="libvirt-client-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811044" comment="libvirt-client-qemu-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811045" comment="libvirt-daemon-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811046" comment="libvirt-daemon-common-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811047" comment="libvirt-daemon-config-network-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811048" comment="libvirt-daemon-config-nwfilter-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811049" comment="libvirt-daemon-driver-interface-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811050" comment="libvirt-daemon-driver-network-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811051" comment="libvirt-daemon-driver-nodedev-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811052" comment="libvirt-daemon-driver-nwfilter-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811053" comment="libvirt-daemon-driver-qemu-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811054" comment="libvirt-daemon-driver-secret-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811055" comment="libvirt-daemon-driver-storage-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811056" comment="libvirt-daemon-driver-storage-core-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811057" comment="libvirt-daemon-driver-storage-disk-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811058" comment="libvirt-daemon-driver-storage-iscsi-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811059" comment="libvirt-daemon-driver-storage-logical-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811060" comment="libvirt-daemon-driver-storage-mpath-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811061" comment="libvirt-daemon-driver-storage-rbd-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811062" comment="libvirt-daemon-driver-storage-scsi-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811063" comment="libvirt-daemon-kvm-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811064" comment="libvirt-daemon-lock-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811065" comment="libvirt-daemon-log-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811066" comment="libvirt-daemon-plugin-lockd-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811067" comment="libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811068" comment="libvirt-daemon-proxy-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811069" comment="libvirt-devel-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811070" comment="libvirt-docs-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811071" comment="libvirt-libs-9.5.0-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811072" comment="libvirt-nss-9.5.0-7.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3974" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-23552" ref_url="https://www.suse.com/security/cve/CVE-2022-23552/" source="CVE"/>
		<reference ref_id="CVE-2022-31123" ref_url="https://www.suse.com/security/cve/CVE-2022-31123/" source="CVE"/>
		<reference ref_id="CVE-2022-31130" ref_url="https://www.suse.com/security/cve/CVE-2022-31130/" source="CVE"/>
		<reference ref_id="CVE-2022-39201" ref_url="https://www.suse.com/security/cve/CVE-2022-39201/" source="CVE"/>
		<reference ref_id="CVE-2022-39306" ref_url="https://www.suse.com/security/cve/CVE-2022-39306/" source="CVE"/>
		<reference ref_id="CVE-2022-39307" ref_url="https://www.suse.com/security/cve/CVE-2022-39307/" source="CVE"/>
		<reference ref_id="CVE-2022-39324" ref_url="https://www.suse.com/security/cve/CVE-2022-39324/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<reference ref_id="CVE-2023-24534" ref_url="https://www.suse.com/security/cve/CVE-2023-24534/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6420.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6420.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23552/">CVE-2022-23552 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23552">CVE-2022-23552 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-31123/">CVE-2022-31123 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31123">CVE-2022-31123 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31130/">CVE-2022-31130 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31130">CVE-2022-31130 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39201/">CVE-2022-39201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39201">CVE-2022-39201 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39306/">CVE-2022-39306 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39306">CVE-2022-39306 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39307/">CVE-2022-39307 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39307">CVE-2022-39307 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-39324/">CVE-2022-39324 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39324">CVE-2022-39324 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24534/">CVE-2023-24534 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813704" comment="grafana-9.2.10-7.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3975" version="1" class="patch">
	<metadata>
		<title>security update for libpq (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6429.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6429.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811073" comment="libpq-13.11-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811074" comment="libpq-devel-13.11-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3976" version="1" class="patch">
	<metadata>
		<title>security update for libfastjson (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6431.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6431.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12762">CVE-2020-12762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810791" comment="libfastjson-0.99.9-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810792" comment="libfastjson-devel-0.99.9-5.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3977" version="1" class="patch">
	<metadata>
		<title>security update for frr (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-36440" ref_url="https://www.suse.com/security/cve/CVE-2022-36440/" source="CVE"/>
		<reference ref_id="CVE-2022-40302" ref_url="https://www.suse.com/security/cve/CVE-2022-40302/" source="CVE"/>
		<reference ref_id="CVE-2022-40318" ref_url="https://www.suse.com/security/cve/CVE-2022-40318/" source="CVE"/>
		<reference ref_id="CVE-2022-43681" ref_url="https://www.suse.com/security/cve/CVE-2022-43681/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6434.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6434.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36440/">CVE-2022-36440 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36440">CVE-2022-36440 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40302/">CVE-2022-40302 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40302">CVE-2022-40302 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40318/">CVE-2022-40318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40318">CVE-2022-40318 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-43681/">CVE-2022-43681 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43681">CVE-2022-43681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811075" comment="frr-8.3.1-11.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811076" comment="frr-selinux-8.3.1-11.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3978" version="1" class="patch">
	<metadata>
		<title>security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0666" ref_url="https://www.suse.com/security/cve/CVE-2023-0666/" source="CVE"/>
		<reference ref_id="CVE-2023-0668" ref_url="https://www.suse.com/security/cve/CVE-2023-0668/" source="CVE"/>
		<reference ref_id="CVE-2023-2855" ref_url="https://www.suse.com/security/cve/CVE-2023-2855/" source="CVE"/>
		<reference ref_id="CVE-2023-2856" ref_url="https://www.suse.com/security/cve/CVE-2023-2856/" source="CVE"/>
		<reference ref_id="CVE-2023-2858" ref_url="https://www.suse.com/security/cve/CVE-2023-2858/" source="CVE"/>
		<reference ref_id="CVE-2023-2952" ref_url="https://www.suse.com/security/cve/CVE-2023-2952/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6469.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6469.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0666/">CVE-2023-0666 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0666">CVE-2023-0666 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0668/">CVE-2023-0668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0668">CVE-2023-0668 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2855/">CVE-2023-2855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2855">CVE-2023-2855 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2856/">CVE-2023-2856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2856">CVE-2023-2856 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2858/">CVE-2023-2858 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2858">CVE-2023-2858 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2952/">CVE-2023-2952 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2952">CVE-2023-2952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811077" comment="wireshark-3.4.10-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811078" comment="wireshark-cli-3.4.10-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811079" comment="wireshark-devel-3.4.10-6.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3979" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724/" source="CVE"/>
		<reference ref_id="CVE-2022-41725" ref_url="https://www.suse.com/security/cve/CVE-2022-41725/" source="CVE"/>
		<reference ref_id="CVE-2023-24534" ref_url="https://www.suse.com/security/cve/CVE-2023-24534/" source="CVE"/>
		<reference ref_id="CVE-2023-24536" ref_url="https://www.suse.com/security/cve/CVE-2023-24536/" source="CVE"/>
		<reference ref_id="CVE-2023-24538" ref_url="https://www.suse.com/security/cve/CVE-2023-24538/" source="CVE"/>
		<reference ref_id="CVE-2023-24539" ref_url="https://www.suse.com/security/cve/CVE-2023-24539/" source="CVE"/>
		<reference ref_id="CVE-2023-24540" ref_url="https://www.suse.com/security/cve/CVE-2023-24540/" source="CVE"/>
		<reference ref_id="CVE-2023-25173" ref_url="https://www.suse.com/security/cve/CVE-2023-25173/" source="CVE"/>
		<reference ref_id="CVE-2023-29400" ref_url="https://www.suse.com/security/cve/CVE-2023-29400/" source="CVE"/>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6473.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6473.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41725/">CVE-2022-41725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24534/">CVE-2023-24534 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24536/">CVE-2023-24536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24538/">CVE-2023-24538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24539/">CVE-2023-24539 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-24540/">CVE-2023-24540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25173/">CVE-2023-25173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-29400/">CVE-2023-29400 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811080" comment="buildah-1.31.3-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811081" comment="buildah-tests-1.31.3-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3980" version="1" class="patch">
	<metadata>
		<title>security update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724/" source="CVE"/>
		<reference ref_id="CVE-2022-41725" ref_url="https://www.suse.com/security/cve/CVE-2022-41725/" source="CVE"/>
		<reference ref_id="CVE-2023-24534" ref_url="https://www.suse.com/security/cve/CVE-2023-24534/" source="CVE"/>
		<reference ref_id="CVE-2023-24536" ref_url="https://www.suse.com/security/cve/CVE-2023-24536/" source="CVE"/>
		<reference ref_id="CVE-2023-24537" ref_url="https://www.suse.com/security/cve/CVE-2023-24537/" source="CVE"/>
		<reference ref_id="CVE-2023-24538" ref_url="https://www.suse.com/security/cve/CVE-2023-24538/" source="CVE"/>
		<reference ref_id="CVE-2023-24539" ref_url="https://www.suse.com/security/cve/CVE-2023-24539/" source="CVE"/>
		<reference ref_id="CVE-2023-24540" ref_url="https://www.suse.com/security/cve/CVE-2023-24540/" source="CVE"/>
		<reference ref_id="CVE-2023-25173" ref_url="https://www.suse.com/security/cve/CVE-2023-25173/" source="CVE"/>
		<reference ref_id="CVE-2023-29400" ref_url="https://www.suse.com/security/cve/CVE-2023-29400/" source="CVE"/>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<reference ref_id="CVE-2023-3978" ref_url="https://www.suse.com/security/cve/CVE-2023-3978/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6474.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6474.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41725/">CVE-2022-41725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24534/">CVE-2023-24534 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24536/">CVE-2023-24536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24537/">CVE-2023-24537 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24538/">CVE-2023-24538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24539/">CVE-2023-24539 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-24540/">CVE-2023-24540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25173/">CVE-2023-25173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-29400/">CVE-2023-29400 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-3978/">CVE-2023-3978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3978">CVE-2023-3978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3981" version="1" class="patch">
	<metadata>
		<title>security update for librabbitmq (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-35789" ref_url="https://www.suse.com/security/cve/CVE-2023-35789/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6482.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6482.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-35789/">CVE-2023-35789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35789">CVE-2023-35789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810799" comment="librabbitmq-0.11.0-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810800" comment="librabbitmq-devel-0.11.0-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810801" comment="librabbitmq-tools-0.11.0-7.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3982" version="1" class="patch">
	<metadata>
		<title>security update for tang (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-1672" ref_url="https://www.suse.com/security/cve/CVE-2023-1672/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6492.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6492.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1672/">CVE-2023-1672 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1672">CVE-2023-1672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811082" comment="tang-14-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3983" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="CVE-2023-41105" ref_url="https://www.suse.com/security/cve/CVE-2023-41105/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6494.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6494.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-41105/">CVE-2023-41105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41105">CVE-2023-41105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811083" comment="python3.11-3.11.5-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811084" comment="python3.11-debug-3.11.5-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811085" comment="python3.11-devel-3.11.5-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811086" comment="python3.11-idle-3.11.5-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811087" comment="python3.11-libs-3.11.5-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811088" comment="python3.11-test-3.11.5-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811089" comment="python3.11-tkinter-3.11.5-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3984" version="1" class="patch">
	<metadata>
		<title>security update for haproxy (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0836" ref_url="https://www.suse.com/security/cve/CVE-2023-0836/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6496.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6496.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0836/">CVE-2023-0836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0836">CVE-2023-0836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811090" comment="haproxy-2.4.22-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3985" version="1" class="patch">
	<metadata>
		<title>security update for libX11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-3138" ref_url="https://www.suse.com/security/cve/CVE-2023-3138/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6497.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6497.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3138/">CVE-2023-3138 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3138">CVE-2023-3138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811091" comment="libX11-1.7.0-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811092" comment="libX11-common-1.7.0-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811093" comment="libX11-devel-1.7.0-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811094" comment="libX11-xcb-1.7.0-8.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3986" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-28100" ref_url="https://www.suse.com/security/cve/CVE-2023-28100/" source="CVE"/>
		<reference ref_id="CVE-2023-28101" ref_url="https://www.suse.com/security/cve/CVE-2023-28101/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6518.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6518.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28100/">CVE-2023-28100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28100">CVE-2023-28100 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28101/">CVE-2023-28101 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28101">CVE-2023-28101 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811095" comment="flatpak-1.12.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811096" comment="flatpak-devel-1.12.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811097" comment="flatpak-libs-1.12.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811098" comment="flatpak-selinux-1.12.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811099" comment="flatpak-session-helper-1.12.8-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3987" version="1" class="patch">
	<metadata>
		<title>security update for python-tornado (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-28370" ref_url="https://www.suse.com/security/cve/CVE-2023-28370/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6523.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6523.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28370/">CVE-2023-28370 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28370">CVE-2023-28370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811100" comment="python3-tornado-6.1.0-9.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3988" version="1" class="patch">
	<metadata>
		<title>security update for dnsmasq (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-28450" ref_url="https://www.suse.com/security/cve/CVE-2023-28450/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6524.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6524.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28450/">CVE-2023-28450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811101" comment="dnsmasq-2.85-14.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811102" comment="dnsmasq-utils-2.85-14.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3989" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-32885" ref_url="https://www.suse.com/security/cve/CVE-2022-32885/" source="CVE"/>
		<reference ref_id="CVE-2022-32919" ref_url="https://www.suse.com/security/cve/CVE-2022-32919/" source="CVE"/>
		<reference ref_id="CVE-2022-32933" ref_url="https://www.suse.com/security/cve/CVE-2022-32933/" source="CVE"/>
		<reference ref_id="CVE-2022-46705" ref_url="https://www.suse.com/security/cve/CVE-2022-46705/" source="CVE"/>
		<reference ref_id="CVE-2022-46725" ref_url="https://www.suse.com/security/cve/CVE-2022-46725/" source="CVE"/>
		<reference ref_id="CVE-2023-27932" ref_url="https://www.suse.com/security/cve/CVE-2023-27932/" source="CVE"/>
		<reference ref_id="CVE-2023-27954" ref_url="https://www.suse.com/security/cve/CVE-2023-27954/" source="CVE"/>
		<reference ref_id="CVE-2023-28198" ref_url="https://www.suse.com/security/cve/CVE-2023-28198/" source="CVE"/>
		<reference ref_id="CVE-2023-32370" ref_url="https://www.suse.com/security/cve/CVE-2023-32370/" source="CVE"/>
		<reference ref_id="CVE-2023-32393" ref_url="https://www.suse.com/security/cve/CVE-2023-32393/" source="CVE"/>
		<reference ref_id="CVE-2023-38133" ref_url="https://www.suse.com/security/cve/CVE-2023-38133/" source="CVE"/>
		<reference ref_id="CVE-2023-38572" ref_url="https://www.suse.com/security/cve/CVE-2023-38572/" source="CVE"/>
		<reference ref_id="CVE-2023-38592" ref_url="https://www.suse.com/security/cve/CVE-2023-38592/" source="CVE"/>
		<reference ref_id="CVE-2023-38594" ref_url="https://www.suse.com/security/cve/CVE-2023-38594/" source="CVE"/>
		<reference ref_id="CVE-2023-38595" ref_url="https://www.suse.com/security/cve/CVE-2023-38595/" source="CVE"/>
		<reference ref_id="CVE-2023-38597" ref_url="https://www.suse.com/security/cve/CVE-2023-38597/" source="CVE"/>
		<reference ref_id="CVE-2023-38599" ref_url="https://www.suse.com/security/cve/CVE-2023-38599/" source="CVE"/>
		<reference ref_id="CVE-2023-38600" ref_url="https://www.suse.com/security/cve/CVE-2023-38600/" source="CVE"/>
		<reference ref_id="CVE-2023-38611" ref_url="https://www.suse.com/security/cve/CVE-2023-38611/" source="CVE"/>
		<reference ref_id="CVE-2023-40397" ref_url="https://www.suse.com/security/cve/CVE-2023-40397/" source="CVE"/>
		<reference ref_id="CVE-2023-40451" ref_url="https://www.suse.com/security/cve/CVE-2023-40451/" source="CVE"/>
		<reference ref_id="CVE-2023-42833" ref_url="https://www.suse.com/security/cve/CVE-2023-42833/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6535.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6535.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32885/">CVE-2022-32885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32885">CVE-2022-32885 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32919/">CVE-2022-32919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32919">CVE-2022-32919 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32933/">CVE-2022-32933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32933">CVE-2022-32933 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46705/">CVE-2022-46705 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46705">CVE-2022-46705 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46725/">CVE-2022-46725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46725">CVE-2022-46725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-27932/">CVE-2023-27932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27932">CVE-2023-27932 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-27954/">CVE-2023-27954 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27954">CVE-2023-27954 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28198/">CVE-2023-28198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28198">CVE-2023-28198 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-32370/">CVE-2023-32370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32370">CVE-2023-32370 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32393/">CVE-2023-32393 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32393">CVE-2023-32393 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38133/">CVE-2023-38133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38133">CVE-2023-38133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38572/">CVE-2023-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38572">CVE-2023-38572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38592/">CVE-2023-38592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38592">CVE-2023-38592 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38594/">CVE-2023-38594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38594">CVE-2023-38594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38595/">CVE-2023-38595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38595">CVE-2023-38595 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38597/">CVE-2023-38597 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38597">CVE-2023-38597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38599/">CVE-2023-38599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38599">CVE-2023-38599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38600/">CVE-2023-38600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38600">CVE-2023-38600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38611/">CVE-2023-38611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38611">CVE-2023-38611 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40397/">CVE-2023-40397 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40397">CVE-2023-40397 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40451/">CVE-2023-40451 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40451">CVE-2023-40451 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42833/">CVE-2023-42833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42833">CVE-2023-42833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3990" version="1" class="patch">
	<metadata>
		<title>security update for perl-CPAN (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-31484" ref_url="https://www.suse.com/security/cve/CVE-2023-31484/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6539.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6539.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31484/">CVE-2023-31484 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31484">CVE-2023-31484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811107" comment="perl-CPAN-2.29-3.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3991" version="1" class="patch">
	<metadata>
		<title>security update for perl-HTTP-Tiny (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-31486" ref_url="https://www.suse.com/security/cve/CVE-2023-31486/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6542.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6542.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31486/">CVE-2023-31486 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31486">CVE-2023-31486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811108" comment="perl-HTTP-Tiny-0.076-461.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3992" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-28879" ref_url="https://www.suse.com/security/cve/CVE-2023-28879/" source="CVE"/>
		<reference ref_id="CVE-2023-38559" ref_url="https://www.suse.com/security/cve/CVE-2023-38559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6544.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6544.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28879/">CVE-2023-28879 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28879">CVE-2023-28879 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38559/">CVE-2023-38559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38559">CVE-2023-38559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811109" comment="ghostscript-9.54.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811110" comment="ghostscript-doc-9.54.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811111" comment="ghostscript-tools-dvipdf-9.54.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811112" comment="ghostscript-tools-fonts-9.54.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811113" comment="ghostscript-tools-printing-9.54.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811114" comment="ghostscript-x11-9.54.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811115" comment="libgs-9.54.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811116" comment="libgs-devel-9.54.0-13.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3993" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-38710" ref_url="https://www.suse.com/security/cve/CVE-2023-38710/" source="CVE"/>
		<reference ref_id="CVE-2023-38711" ref_url="https://www.suse.com/security/cve/CVE-2023-38711/" source="CVE"/>
		<reference ref_id="CVE-2023-38712" ref_url="https://www.suse.com/security/cve/CVE-2023-38712/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6549.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6549.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38710/">CVE-2023-38710 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38710">CVE-2023-38710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38711/">CVE-2023-38711 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38711">CVE-2023-38711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38712/">CVE-2023-38712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38712">CVE-2023-38712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811117" comment="libreswan-4.12-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3994" version="1" class="patch">
	<metadata>
		<title>security update for yajl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-33460" ref_url="https://www.suse.com/security/cve/CVE-2023-33460/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6551.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6551.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33460/">CVE-2023-33460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33460">CVE-2023-33460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811118" comment="yajl-2.1.0-22.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811119" comment="yajl-devel-2.1.0-22.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3995" version="1" class="patch">
	<metadata>
		<title>security update for libmicrohttpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-27371" ref_url="https://www.suse.com/security/cve/CVE-2023-27371/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6566.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6566.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27371/">CVE-2023-27371 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27371">CVE-2023-27371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813977" comment="libmicrohttpd-0.9.72-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813978" comment="libmicrohttpd-devel-0.9.72-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813979" comment="libmicrohttpd-doc-0.9.72-5.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3996" version="1" class="patch">
	<metadata>
		<title>security update for sysstat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-33204" ref_url="https://www.suse.com/security/cve/CVE-2023-33204/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6569.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6569.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33204/">CVE-2023-33204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33204">CVE-2023-33204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811120" comment="sysstat-12.5.4-7.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3997" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-24998" ref_url="https://www.suse.com/security/cve/CVE-2023-24998/" source="CVE"/>
		<reference ref_id="CVE-2023-28708" ref_url="https://www.suse.com/security/cve/CVE-2023-28708/" source="CVE"/>
		<reference ref_id="CVE-2023-28709" ref_url="https://www.suse.com/security/cve/CVE-2023-28709/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6570.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6570.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24998/">CVE-2023-24998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24998">CVE-2023-24998 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28708/">CVE-2023-28708 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28708">CVE-2023-28708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28709/">CVE-2023-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28709">CVE-2023-28709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811121" comment="tomcat-9.0.62-37.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811122" comment="tomcat-admin-webapps-9.0.62-37.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811123" comment="tomcat-docs-webapp-9.0.62-37.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811124" comment="tomcat-el-3.0-api-9.0.62-37.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811125" comment="tomcat-jsp-2.3-api-9.0.62-37.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811126" comment="tomcat-lib-9.0.62-37.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811127" comment="tomcat-servlet-4.0-api-9.0.62-37.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811128" comment="tomcat-webapps-9.0.62-37.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3998" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2023-26965" ref_url="https://www.suse.com/security/cve/CVE-2023-26965/" source="CVE"/>
		<reference ref_id="CVE-2023-26966" ref_url="https://www.suse.com/security/cve/CVE-2023-26966/" source="CVE"/>
		<reference ref_id="CVE-2023-2731" ref_url="https://www.suse.com/security/cve/CVE-2023-2731/" source="CVE"/>
		<reference ref_id="CVE-2023-3316" ref_url="https://www.suse.com/security/cve/CVE-2023-3316/" source="CVE"/>
		<reference ref_id="CVE-2023-3576" ref_url="https://www.suse.com/security/cve/CVE-2023-3576/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6575.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6575.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17095">CVE-2017-17095 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26965/">CVE-2023-26965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26965">CVE-2023-26965 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-26966/">CVE-2023-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26966">CVE-2023-26966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2731/">CVE-2023-2731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2731">CVE-2023-2731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3316/">CVE-2023-3316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3316">CVE-2023-3316 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3576/">CVE-2023-3576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3576">CVE-2023-3576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811129" comment="libtiff-4.4.0-10.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811130" comment="libtiff-devel-4.4.0-10.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811131" comment="libtiff-tools-4.4.0-10.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3999" version="1" class="patch">
	<metadata>
		<title>security update for libqb (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-39976" ref_url="https://www.suse.com/security/cve/CVE-2023-39976/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6578.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6578.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39976/">CVE-2023-39976 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39976">CVE-2023-39976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811132" comment="libqb-2.0.6-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811133" comment="libqb-devel-2.0.6-4.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4000" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-47515" ref_url="https://www.suse.com/security/cve/CVE-2021-47515/" source="CVE"/>
		<reference ref_id="CVE-2022-3523" ref_url="https://www.suse.com/security/cve/CVE-2022-3523/" source="CVE"/>
		<reference ref_id="CVE-2022-3565" ref_url="https://www.suse.com/security/cve/CVE-2022-3565/" source="CVE"/>
		<reference ref_id="CVE-2022-3594" ref_url="https://www.suse.com/security/cve/CVE-2022-3594/" source="CVE"/>
		<reference ref_id="CVE-2022-38457" ref_url="https://www.suse.com/security/cve/CVE-2022-38457/" source="CVE"/>
		<reference ref_id="CVE-2022-40133" ref_url="https://www.suse.com/security/cve/CVE-2022-40133/" source="CVE"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2022-42895" ref_url="https://www.suse.com/security/cve/CVE-2022-42895/" source="CVE"/>
		<reference ref_id="CVE-2022-48950" ref_url="https://www.suse.com/security/cve/CVE-2022-48950/" source="CVE"/>
		<reference ref_id="CVE-2022-48975" ref_url="https://www.suse.com/security/cve/CVE-2022-48975/" source="CVE"/>
		<reference ref_id="CVE-2022-48988" ref_url="https://www.suse.com/security/cve/CVE-2022-48988/" source="CVE"/>
		<reference ref_id="CVE-2022-48991" ref_url="https://www.suse.com/security/cve/CVE-2022-48991/" source="CVE"/>
		<reference ref_id="CVE-2022-48997" ref_url="https://www.suse.com/security/cve/CVE-2022-48997/" source="CVE"/>
		<reference ref_id="CVE-2022-49028" ref_url="https://www.suse.com/security/cve/CVE-2022-49028/" source="CVE"/>
		<reference ref_id="CVE-2022-49220" ref_url="https://www.suse.com/security/cve/CVE-2022-49220/" source="CVE"/>
		<reference ref_id="CVE-2022-49256" ref_url="https://www.suse.com/security/cve/CVE-2022-49256/" source="CVE"/>
		<reference ref_id="CVE-2022-49257" ref_url="https://www.suse.com/security/cve/CVE-2022-49257/" source="CVE"/>
		<reference ref_id="CVE-2022-49273" ref_url="https://www.suse.com/security/cve/CVE-2022-49273/" source="CVE"/>
		<reference ref_id="CVE-2022-49287" ref_url="https://www.suse.com/security/cve/CVE-2022-49287/" source="CVE"/>
		<reference ref_id="CVE-2022-49316" ref_url="https://www.suse.com/security/cve/CVE-2022-49316/" source="CVE"/>
		<reference ref_id="CVE-2022-49321" ref_url="https://www.suse.com/security/cve/CVE-2022-49321/" source="CVE"/>
		<reference ref_id="CVE-2022-49339" ref_url="https://www.suse.com/security/cve/CVE-2022-49339/" source="CVE"/>
		<reference ref_id="CVE-2022-49344" ref_url="https://www.suse.com/security/cve/CVE-2022-49344/" source="CVE"/>
		<reference ref_id="CVE-2022-49466" ref_url="https://www.suse.com/security/cve/CVE-2022-49466/" source="CVE"/>
		<reference ref_id="CVE-2022-49567" ref_url="https://www.suse.com/security/cve/CVE-2022-49567/" source="CVE"/>
		<reference ref_id="CVE-2022-49653" ref_url="https://www.suse.com/security/cve/CVE-2022-49653/" source="CVE"/>
		<reference ref_id="CVE-2022-49687" ref_url="https://www.suse.com/security/cve/CVE-2022-49687/" source="CVE"/>
		<reference ref_id="CVE-2022-49699" ref_url="https://www.suse.com/security/cve/CVE-2022-49699/" source="CVE"/>
		<reference ref_id="CVE-2022-49715" ref_url="https://www.suse.com/security/cve/CVE-2022-49715/" source="CVE"/>
		<reference ref_id="CVE-2022-49716" ref_url="https://www.suse.com/security/cve/CVE-2022-49716/" source="CVE"/>
		<reference ref_id="CVE-2022-49731" ref_url="https://www.suse.com/security/cve/CVE-2022-49731/" source="CVE"/>
		<reference ref_id="CVE-2022-49746" ref_url="https://www.suse.com/security/cve/CVE-2022-49746/" source="CVE"/>
		<reference ref_id="CVE-2022-49748" ref_url="https://www.suse.com/security/cve/CVE-2022-49748/" source="CVE"/>
		<reference ref_id="CVE-2022-49750" ref_url="https://www.suse.com/security/cve/CVE-2022-49750/" source="CVE"/>
		<reference ref_id="CVE-2022-49752" ref_url="https://www.suse.com/security/cve/CVE-2022-49752/" source="CVE"/>
		<reference ref_id="CVE-2022-49759" ref_url="https://www.suse.com/security/cve/CVE-2022-49759/" source="CVE"/>
		<reference ref_id="CVE-2022-49760" ref_url="https://www.suse.com/security/cve/CVE-2022-49760/" source="CVE"/>
		<reference ref_id="CVE-2022-49773" ref_url="https://www.suse.com/security/cve/CVE-2022-49773/" source="CVE"/>
		<reference ref_id="CVE-2022-49774" ref_url="https://www.suse.com/security/cve/CVE-2022-49774/" source="CVE"/>
		<reference ref_id="CVE-2022-49795" ref_url="https://www.suse.com/security/cve/CVE-2022-49795/" source="CVE"/>
		<reference ref_id="CVE-2022-49811" ref_url="https://www.suse.com/security/cve/CVE-2022-49811/" source="CVE"/>
		<reference ref_id="CVE-2022-49827" ref_url="https://www.suse.com/security/cve/CVE-2022-49827/" source="CVE"/>
		<reference ref_id="CVE-2022-49837" ref_url="https://www.suse.com/security/cve/CVE-2022-49837/" source="CVE"/>
		<reference ref_id="CVE-2022-49839" ref_url="https://www.suse.com/security/cve/CVE-2022-49839/" source="CVE"/>
		<reference ref_id="CVE-2022-49855" ref_url="https://www.suse.com/security/cve/CVE-2022-49855/" source="CVE"/>
		<reference ref_id="CVE-2022-49864" ref_url="https://www.suse.com/security/cve/CVE-2022-49864/" source="CVE"/>
		<reference ref_id="CVE-2022-49873" ref_url="https://www.suse.com/security/cve/CVE-2022-49873/" source="CVE"/>
		<reference ref_id="CVE-2022-49875" ref_url="https://www.suse.com/security/cve/CVE-2022-49875/" source="CVE"/>
		<reference ref_id="CVE-2022-49878" ref_url="https://www.suse.com/security/cve/CVE-2022-49878/" source="CVE"/>
		<reference ref_id="CVE-2022-49882" ref_url="https://www.suse.com/security/cve/CVE-2022-49882/" source="CVE"/>
		<reference ref_id="CVE-2022-49885" ref_url="https://www.suse.com/security/cve/CVE-2022-49885/" source="CVE"/>
		<reference ref_id="CVE-2022-49938" ref_url="https://www.suse.com/security/cve/CVE-2022-49938/" source="CVE"/>
		<reference ref_id="CVE-2022-50004" ref_url="https://www.suse.com/security/cve/CVE-2022-50004/" source="CVE"/>
		<reference ref_id="CVE-2022-50005" ref_url="https://www.suse.com/security/cve/CVE-2022-50005/" source="CVE"/>
		<reference ref_id="CVE-2022-50042" ref_url="https://www.suse.com/security/cve/CVE-2022-50042/" source="CVE"/>
		<reference ref_id="CVE-2022-50064" ref_url="https://www.suse.com/security/cve/CVE-2022-50064/" source="CVE"/>
		<reference ref_id="CVE-2022-50066" ref_url="https://www.suse.com/security/cve/CVE-2022-50066/" source="CVE"/>
		<reference ref_id="CVE-2022-50072" ref_url="https://www.suse.com/security/cve/CVE-2022-50072/" source="CVE"/>
		<reference ref_id="CVE-2022-50076" ref_url="https://www.suse.com/security/cve/CVE-2022-50076/" source="CVE"/>
		<reference ref_id="CVE-2022-50087" ref_url="https://www.suse.com/security/cve/CVE-2022-50087/" source="CVE"/>
		<reference ref_id="CVE-2022-50091" ref_url="https://www.suse.com/security/cve/CVE-2022-50091/" source="CVE"/>
		<reference ref_id="CVE-2022-50107" ref_url="https://www.suse.com/security/cve/CVE-2022-50107/" source="CVE"/>
		<reference ref_id="CVE-2022-50110" ref_url="https://www.suse.com/security/cve/CVE-2022-50110/" source="CVE"/>
		<reference ref_id="CVE-2022-50117" ref_url="https://www.suse.com/security/cve/CVE-2022-50117/" source="CVE"/>
		<reference ref_id="CVE-2022-50127" ref_url="https://www.suse.com/security/cve/CVE-2022-50127/" source="CVE"/>
		<reference ref_id="CVE-2022-50135" ref_url="https://www.suse.com/security/cve/CVE-2022-50135/" source="CVE"/>
		<reference ref_id="CVE-2022-50191" ref_url="https://www.suse.com/security/cve/CVE-2022-50191/" source="CVE"/>
		<reference ref_id="CVE-2022-50200" ref_url="https://www.suse.com/security/cve/CVE-2022-50200/" source="CVE"/>
		<reference ref_id="CVE-2022-50201" ref_url="https://www.suse.com/security/cve/CVE-2022-50201/" source="CVE"/>
		<reference ref_id="CVE-2022-50234" ref_url="https://www.suse.com/security/cve/CVE-2022-50234/" source="CVE"/>
		<reference ref_id="CVE-2022-50239" ref_url="https://www.suse.com/security/cve/CVE-2022-50239/" source="CVE"/>
		<reference ref_id="CVE-2022-50246" ref_url="https://www.suse.com/security/cve/CVE-2022-50246/" source="CVE"/>
		<reference ref_id="CVE-2022-50247" ref_url="https://www.suse.com/security/cve/CVE-2022-50247/" source="CVE"/>
		<reference ref_id="CVE-2022-50249" ref_url="https://www.suse.com/security/cve/CVE-2022-50249/" source="CVE"/>
		<reference ref_id="CVE-2022-50250" ref_url="https://www.suse.com/security/cve/CVE-2022-50250/" source="CVE"/>
		<reference ref_id="CVE-2022-50258" ref_url="https://www.suse.com/security/cve/CVE-2022-50258/" source="CVE"/>
		<reference ref_id="CVE-2022-50269" ref_url="https://www.suse.com/security/cve/CVE-2022-50269/" source="CVE"/>
		<reference ref_id="CVE-2022-50272" ref_url="https://www.suse.com/security/cve/CVE-2022-50272/" source="CVE"/>
		<reference ref_id="CVE-2022-50275" ref_url="https://www.suse.com/security/cve/CVE-2022-50275/" source="CVE"/>
		<reference ref_id="CVE-2022-50276" ref_url="https://www.suse.com/security/cve/CVE-2022-50276/" source="CVE"/>
		<reference ref_id="CVE-2022-50279" ref_url="https://www.suse.com/security/cve/CVE-2022-50279/" source="CVE"/>
		<reference ref_id="CVE-2022-50287" ref_url="https://www.suse.com/security/cve/CVE-2022-50287/" source="CVE"/>
		<reference ref_id="CVE-2022-50290" ref_url="https://www.suse.com/security/cve/CVE-2022-50290/" source="CVE"/>
		<reference ref_id="CVE-2022-50295" ref_url="https://www.suse.com/security/cve/CVE-2022-50295/" source="CVE"/>
		<reference ref_id="CVE-2022-50297" ref_url="https://www.suse.com/security/cve/CVE-2022-50297/" source="CVE"/>
		<reference ref_id="CVE-2022-50303" ref_url="https://www.suse.com/security/cve/CVE-2022-50303/" source="CVE"/>
		<reference ref_id="CVE-2022-50317" ref_url="https://www.suse.com/security/cve/CVE-2022-50317/" source="CVE"/>
		<reference ref_id="CVE-2022-50318" ref_url="https://www.suse.com/security/cve/CVE-2022-50318/" source="CVE"/>
		<reference ref_id="CVE-2022-50322" ref_url="https://www.suse.com/security/cve/CVE-2022-50322/" source="CVE"/>
		<reference ref_id="CVE-2022-50327" ref_url="https://www.suse.com/security/cve/CVE-2022-50327/" source="CVE"/>
		<reference ref_id="CVE-2022-50329" ref_url="https://www.suse.com/security/cve/CVE-2022-50329/" source="CVE"/>
		<reference ref_id="CVE-2022-50341" ref_url="https://www.suse.com/security/cve/CVE-2022-50341/" source="CVE"/>
		<reference ref_id="CVE-2022-50342" ref_url="https://www.suse.com/security/cve/CVE-2022-50342/" source="CVE"/>
		<reference ref_id="CVE-2022-50351" ref_url="https://www.suse.com/security/cve/CVE-2022-50351/" source="CVE"/>
		<reference ref_id="CVE-2022-50354" ref_url="https://www.suse.com/security/cve/CVE-2022-50354/" source="CVE"/>
		<reference ref_id="CVE-2022-50356" ref_url="https://www.suse.com/security/cve/CVE-2022-50356/" source="CVE"/>
		<reference ref_id="CVE-2022-50357" ref_url="https://www.suse.com/security/cve/CVE-2022-50357/" source="CVE"/>
		<reference ref_id="CVE-2022-50361" ref_url="https://www.suse.com/security/cve/CVE-2022-50361/" source="CVE"/>
		<reference ref_id="CVE-2022-50369" ref_url="https://www.suse.com/security/cve/CVE-2022-50369/" source="CVE"/>
		<reference ref_id="CVE-2022-50372" ref_url="https://www.suse.com/security/cve/CVE-2022-50372/" source="CVE"/>
		<reference ref_id="CVE-2022-50389" ref_url="https://www.suse.com/security/cve/CVE-2022-50389/" source="CVE"/>
		<reference ref_id="CVE-2022-50390" ref_url="https://www.suse.com/security/cve/CVE-2022-50390/" source="CVE"/>
		<reference ref_id="CVE-2022-50391" ref_url="https://www.suse.com/security/cve/CVE-2022-50391/" source="CVE"/>
		<reference ref_id="CVE-2022-50393" ref_url="https://www.suse.com/security/cve/CVE-2022-50393/" source="CVE"/>
		<reference ref_id="CVE-2022-50406" ref_url="https://www.suse.com/security/cve/CVE-2022-50406/" source="CVE"/>
		<reference ref_id="CVE-2022-50412" ref_url="https://www.suse.com/security/cve/CVE-2022-50412/" source="CVE"/>
		<reference ref_id="CVE-2022-50416" ref_url="https://www.suse.com/security/cve/CVE-2022-50416/" source="CVE"/>
		<reference ref_id="CVE-2022-50423" ref_url="https://www.suse.com/security/cve/CVE-2022-50423/" source="CVE"/>
		<reference ref_id="CVE-2022-50426" ref_url="https://www.suse.com/security/cve/CVE-2022-50426/" source="CVE"/>
		<reference ref_id="CVE-2022-50429" ref_url="https://www.suse.com/security/cve/CVE-2022-50429/" source="CVE"/>
		<reference ref_id="CVE-2022-50440" ref_url="https://www.suse.com/security/cve/CVE-2022-50440/" source="CVE"/>
		<reference ref_id="CVE-2022-50444" ref_url="https://www.suse.com/security/cve/CVE-2022-50444/" source="CVE"/>
		<reference ref_id="CVE-2022-50453" ref_url="https://www.suse.com/security/cve/CVE-2022-50453/" source="CVE"/>
		<reference ref_id="CVE-2022-50458" ref_url="https://www.suse.com/security/cve/CVE-2022-50458/" source="CVE"/>
		<reference ref_id="CVE-2022-50460" ref_url="https://www.suse.com/security/cve/CVE-2022-50460/" source="CVE"/>
		<reference ref_id="CVE-2022-50464" ref_url="https://www.suse.com/security/cve/CVE-2022-50464/" source="CVE"/>
		<reference ref_id="CVE-2022-50470" ref_url="https://www.suse.com/security/cve/CVE-2022-50470/" source="CVE"/>
		<reference ref_id="CVE-2022-50472" ref_url="https://www.suse.com/security/cve/CVE-2022-50472/" source="CVE"/>
		<reference ref_id="CVE-2022-50473" ref_url="https://www.suse.com/security/cve/CVE-2022-50473/" source="CVE"/>
		<reference ref_id="CVE-2022-50475" ref_url="https://www.suse.com/security/cve/CVE-2022-50475/" source="CVE"/>
		<reference ref_id="CVE-2022-50477" ref_url="https://www.suse.com/security/cve/CVE-2022-50477/" source="CVE"/>
		<reference ref_id="CVE-2022-50479" ref_url="https://www.suse.com/security/cve/CVE-2022-50479/" source="CVE"/>
		<reference ref_id="CVE-2022-50482" ref_url="https://www.suse.com/security/cve/CVE-2022-50482/" source="CVE"/>
		<reference ref_id="CVE-2022-50488" ref_url="https://www.suse.com/security/cve/CVE-2022-50488/" source="CVE"/>
		<reference ref_id="CVE-2022-50489" ref_url="https://www.suse.com/security/cve/CVE-2022-50489/" source="CVE"/>
		<reference ref_id="CVE-2022-50494" ref_url="https://www.suse.com/security/cve/CVE-2022-50494/" source="CVE"/>
		<reference ref_id="CVE-2022-50505" ref_url="https://www.suse.com/security/cve/CVE-2022-50505/" source="CVE"/>
		<reference ref_id="CVE-2022-50510" ref_url="https://www.suse.com/security/cve/CVE-2022-50510/" source="CVE"/>
		<reference ref_id="CVE-2022-50515" ref_url="https://www.suse.com/security/cve/CVE-2022-50515/" source="CVE"/>
		<reference ref_id="CVE-2022-50520" ref_url="https://www.suse.com/security/cve/CVE-2022-50520/" source="CVE"/>
		<reference ref_id="CVE-2022-50527" ref_url="https://www.suse.com/security/cve/CVE-2022-50527/" source="CVE"/>
		<reference ref_id="CVE-2022-50528" ref_url="https://www.suse.com/security/cve/CVE-2022-50528/" source="CVE"/>
		<reference ref_id="CVE-2022-50532" ref_url="https://www.suse.com/security/cve/CVE-2022-50532/" source="CVE"/>
		<reference ref_id="CVE-2022-50535" ref_url="https://www.suse.com/security/cve/CVE-2022-50535/" source="CVE"/>
		<reference ref_id="CVE-2022-50536" ref_url="https://www.suse.com/security/cve/CVE-2022-50536/" source="CVE"/>
		<reference ref_id="CVE-2022-50540" ref_url="https://www.suse.com/security/cve/CVE-2022-50540/" source="CVE"/>
		<reference ref_id="CVE-2022-50543" ref_url="https://www.suse.com/security/cve/CVE-2022-50543/" source="CVE"/>
		<reference ref_id="CVE-2022-50544" ref_url="https://www.suse.com/security/cve/CVE-2022-50544/" source="CVE"/>
		<reference ref_id="CVE-2022-50550" ref_url="https://www.suse.com/security/cve/CVE-2022-50550/" source="CVE"/>
		<reference ref_id="CVE-2022-50556" ref_url="https://www.suse.com/security/cve/CVE-2022-50556/" source="CVE"/>
		<reference ref_id="CVE-2022-50558" ref_url="https://www.suse.com/security/cve/CVE-2022-50558/" source="CVE"/>
		<reference ref_id="CVE-2022-50562" ref_url="https://www.suse.com/security/cve/CVE-2022-50562/" source="CVE"/>
		<reference ref_id="CVE-2022-50578" ref_url="https://www.suse.com/security/cve/CVE-2022-50578/" source="CVE"/>
		<reference ref_id="CVE-2022-50582" ref_url="https://www.suse.com/security/cve/CVE-2022-50582/" source="CVE"/>
		<reference ref_id="CVE-2022-50616" ref_url="https://www.suse.com/security/cve/CVE-2022-50616/" source="CVE"/>
		<reference ref_id="CVE-2022-50617" ref_url="https://www.suse.com/security/cve/CVE-2022-50617/" source="CVE"/>
		<reference ref_id="CVE-2022-50619" ref_url="https://www.suse.com/security/cve/CVE-2022-50619/" source="CVE"/>
		<reference ref_id="CVE-2022-50626" ref_url="https://www.suse.com/security/cve/CVE-2022-50626/" source="CVE"/>
		<reference ref_id="CVE-2022-50627" ref_url="https://www.suse.com/security/cve/CVE-2022-50627/" source="CVE"/>
		<reference ref_id="CVE-2022-50628" ref_url="https://www.suse.com/security/cve/CVE-2022-50628/" source="CVE"/>
		<reference ref_id="CVE-2022-50630" ref_url="https://www.suse.com/security/cve/CVE-2022-50630/" source="CVE"/>
		<reference ref_id="CVE-2022-50632" ref_url="https://www.suse.com/security/cve/CVE-2022-50632/" source="CVE"/>
		<reference ref_id="CVE-2022-50633" ref_url="https://www.suse.com/security/cve/CVE-2022-50633/" source="CVE"/>
		<reference ref_id="CVE-2022-50636" ref_url="https://www.suse.com/security/cve/CVE-2022-50636/" source="CVE"/>
		<reference ref_id="CVE-2022-50639" ref_url="https://www.suse.com/security/cve/CVE-2022-50639/" source="CVE"/>
		<reference ref_id="CVE-2022-50643" ref_url="https://www.suse.com/security/cve/CVE-2022-50643/" source="CVE"/>
		<reference ref_id="CVE-2022-50645" ref_url="https://www.suse.com/security/cve/CVE-2022-50645/" source="CVE"/>
		<reference ref_id="CVE-2022-50650" ref_url="https://www.suse.com/security/cve/CVE-2022-50650/" source="CVE"/>
		<reference ref_id="CVE-2022-50658" ref_url="https://www.suse.com/security/cve/CVE-2022-50658/" source="CVE"/>
		<reference ref_id="CVE-2022-50667" ref_url="https://www.suse.com/security/cve/CVE-2022-50667/" source="CVE"/>
		<reference ref_id="CVE-2022-50671" ref_url="https://www.suse.com/security/cve/CVE-2022-50671/" source="CVE"/>
		<reference ref_id="CVE-2022-50675" ref_url="https://www.suse.com/security/cve/CVE-2022-50675/" source="CVE"/>
		<reference ref_id="CVE-2022-50677" ref_url="https://www.suse.com/security/cve/CVE-2022-50677/" source="CVE"/>
		<reference ref_id="CVE-2022-50699" ref_url="https://www.suse.com/security/cve/CVE-2022-50699/" source="CVE"/>
		<reference ref_id="CVE-2022-50700" ref_url="https://www.suse.com/security/cve/CVE-2022-50700/" source="CVE"/>
		<reference ref_id="CVE-2022-50701" ref_url="https://www.suse.com/security/cve/CVE-2022-50701/" source="CVE"/>
		<reference ref_id="CVE-2022-50704" ref_url="https://www.suse.com/security/cve/CVE-2022-50704/" source="CVE"/>
		<reference ref_id="CVE-2022-50705" ref_url="https://www.suse.com/security/cve/CVE-2022-50705/" source="CVE"/>
		<reference ref_id="CVE-2022-50710" ref_url="https://www.suse.com/security/cve/CVE-2022-50710/" source="CVE"/>
		<reference ref_id="CVE-2022-50712" ref_url="https://www.suse.com/security/cve/CVE-2022-50712/" source="CVE"/>
		<reference ref_id="CVE-2022-50718" ref_url="https://www.suse.com/security/cve/CVE-2022-50718/" source="CVE"/>
		<reference ref_id="CVE-2022-50721" ref_url="https://www.suse.com/security/cve/CVE-2022-50721/" source="CVE"/>
		<reference ref_id="CVE-2022-50724" ref_url="https://www.suse.com/security/cve/CVE-2022-50724/" source="CVE"/>
		<reference ref_id="CVE-2022-50728" ref_url="https://www.suse.com/security/cve/CVE-2022-50728/" source="CVE"/>
		<reference ref_id="CVE-2022-50733" ref_url="https://www.suse.com/security/cve/CVE-2022-50733/" source="CVE"/>
		<reference ref_id="CVE-2022-50735" ref_url="https://www.suse.com/security/cve/CVE-2022-50735/" source="CVE"/>
		<reference ref_id="CVE-2022-50740" ref_url="https://www.suse.com/security/cve/CVE-2022-50740/" source="CVE"/>
		<reference ref_id="CVE-2022-50750" ref_url="https://www.suse.com/security/cve/CVE-2022-50750/" source="CVE"/>
		<reference ref_id="CVE-2022-50756" ref_url="https://www.suse.com/security/cve/CVE-2022-50756/" source="CVE"/>
		<reference ref_id="CVE-2022-50760" ref_url="https://www.suse.com/security/cve/CVE-2022-50760/" source="CVE"/>
		<reference ref_id="CVE-2022-50771" ref_url="https://www.suse.com/security/cve/CVE-2022-50771/" source="CVE"/>
		<reference ref_id="CVE-2022-50772" ref_url="https://www.suse.com/security/cve/CVE-2022-50772/" source="CVE"/>
		<reference ref_id="CVE-2022-50781" ref_url="https://www.suse.com/security/cve/CVE-2022-50781/" source="CVE"/>
		<reference ref_id="CVE-2022-50784" ref_url="https://www.suse.com/security/cve/CVE-2022-50784/" source="CVE"/>
		<reference ref_id="CVE-2022-50809" ref_url="https://www.suse.com/security/cve/CVE-2022-50809/" source="CVE"/>
		<reference ref_id="CVE-2022-50817" ref_url="https://www.suse.com/security/cve/CVE-2022-50817/" source="CVE"/>
		<reference ref_id="CVE-2022-50819" ref_url="https://www.suse.com/security/cve/CVE-2022-50819/" source="CVE"/>
		<reference ref_id="CVE-2022-50820" ref_url="https://www.suse.com/security/cve/CVE-2022-50820/" source="CVE"/>
		<reference ref_id="CVE-2022-50822" ref_url="https://www.suse.com/security/cve/CVE-2022-50822/" source="CVE"/>
		<reference ref_id="CVE-2022-50823" ref_url="https://www.suse.com/security/cve/CVE-2022-50823/" source="CVE"/>
		<reference ref_id="CVE-2022-50824" ref_url="https://www.suse.com/security/cve/CVE-2022-50824/" source="CVE"/>
		<reference ref_id="CVE-2022-50825" ref_url="https://www.suse.com/security/cve/CVE-2022-50825/" source="CVE"/>
		<reference ref_id="CVE-2022-50829" ref_url="https://www.suse.com/security/cve/CVE-2022-50829/" source="CVE"/>
		<reference ref_id="CVE-2022-50832" ref_url="https://www.suse.com/security/cve/CVE-2022-50832/" source="CVE"/>
		<reference ref_id="CVE-2022-50842" ref_url="https://www.suse.com/security/cve/CVE-2022-50842/" source="CVE"/>
		<reference ref_id="CVE-2022-50844" ref_url="https://www.suse.com/security/cve/CVE-2022-50844/" source="CVE"/>
		<reference ref_id="CVE-2022-50847" ref_url="https://www.suse.com/security/cve/CVE-2022-50847/" source="CVE"/>
		<reference ref_id="CVE-2022-50856" ref_url="https://www.suse.com/security/cve/CVE-2022-50856/" source="CVE"/>
		<reference ref_id="CVE-2022-50862" ref_url="https://www.suse.com/security/cve/CVE-2022-50862/" source="CVE"/>
		<reference ref_id="CVE-2022-50865" ref_url="https://www.suse.com/security/cve/CVE-2022-50865/" source="CVE"/>
		<reference ref_id="CVE-2022-50878" ref_url="https://www.suse.com/security/cve/CVE-2022-50878/" source="CVE"/>
		<reference ref_id="CVE-2022-50881" ref_url="https://www.suse.com/security/cve/CVE-2022-50881/" source="CVE"/>
		<reference ref_id="CVE-2022-50882" ref_url="https://www.suse.com/security/cve/CVE-2022-50882/" source="CVE"/>
		<reference ref_id="CVE-2022-50883" ref_url="https://www.suse.com/security/cve/CVE-2022-50883/" source="CVE"/>
		<reference ref_id="CVE-2022-50885" ref_url="https://www.suse.com/security/cve/CVE-2022-50885/" source="CVE"/>
		<reference ref_id="CVE-2023-0597" ref_url="https://www.suse.com/security/cve/CVE-2023-0597/" source="CVE"/>
		<reference ref_id="CVE-2023-1073" ref_url="https://www.suse.com/security/cve/CVE-2023-1073/" source="CVE"/>
		<reference ref_id="CVE-2023-1074" ref_url="https://www.suse.com/security/cve/CVE-2023-1074/" source="CVE"/>
		<reference ref_id="CVE-2023-1075" ref_url="https://www.suse.com/security/cve/CVE-2023-1075/" source="CVE"/>
		<reference ref_id="CVE-2023-1076" ref_url="https://www.suse.com/security/cve/CVE-2023-1076/" source="CVE"/>
		<reference ref_id="CVE-2023-1077" ref_url="https://www.suse.com/security/cve/CVE-2023-1077/" source="CVE"/>
		<reference ref_id="CVE-2023-1079" ref_url="https://www.suse.com/security/cve/CVE-2023-1079/" source="CVE"/>
		<reference ref_id="CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206/" source="CVE"/>
		<reference ref_id="CVE-2023-1249" ref_url="https://www.suse.com/security/cve/CVE-2023-1249/" source="CVE"/>
		<reference ref_id="CVE-2023-1252" ref_url="https://www.suse.com/security/cve/CVE-2023-1252/" source="CVE"/>
		<reference ref_id="CVE-2023-1380" ref_url="https://www.suse.com/security/cve/CVE-2023-1380/" source="CVE"/>
		<reference ref_id="CVE-2023-1652" ref_url="https://www.suse.com/security/cve/CVE-2023-1652/" source="CVE"/>
		<reference ref_id="CVE-2023-1838" ref_url="https://www.suse.com/security/cve/CVE-2023-1838/" source="CVE"/>
		<reference ref_id="CVE-2023-1855" ref_url="https://www.suse.com/security/cve/CVE-2023-1855/" source="CVE"/>
		<reference ref_id="CVE-2023-1989" ref_url="https://www.suse.com/security/cve/CVE-2023-1989/" source="CVE"/>
		<reference ref_id="CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156/" source="CVE"/>
		<reference ref_id="CVE-2023-2269" ref_url="https://www.suse.com/security/cve/CVE-2023-2269/" source="CVE"/>
		<reference ref_id="CVE-2023-26545" ref_url="https://www.suse.com/security/cve/CVE-2023-26545/" source="CVE"/>
		<reference ref_id="CVE-2023-30456" ref_url="https://www.suse.com/security/cve/CVE-2023-30456/" source="CVE"/>
		<reference ref_id="CVE-2023-3141" ref_url="https://www.suse.com/security/cve/CVE-2023-3141/" source="CVE"/>
		<reference ref_id="CVE-2023-3161" ref_url="https://www.suse.com/security/cve/CVE-2023-3161/" source="CVE"/>
		<reference ref_id="CVE-2023-3212" ref_url="https://www.suse.com/security/cve/CVE-2023-3212/" source="CVE"/>
		<reference ref_id="CVE-2023-3268" ref_url="https://www.suse.com/security/cve/CVE-2023-3268/" source="CVE"/>
		<reference ref_id="CVE-2023-33203" ref_url="https://www.suse.com/security/cve/CVE-2023-33203/" source="CVE"/>
		<reference ref_id="CVE-2023-3358" ref_url="https://www.suse.com/security/cve/CVE-2023-3358/" source="CVE"/>
		<reference ref_id="CVE-2023-33951" ref_url="https://www.suse.com/security/cve/CVE-2023-33951/" source="CVE"/>
		<reference ref_id="CVE-2023-33952" ref_url="https://www.suse.com/security/cve/CVE-2023-33952/" source="CVE"/>
		<reference ref_id="CVE-2023-35825" ref_url="https://www.suse.com/security/cve/CVE-2023-35825/" source="CVE"/>
		<reference ref_id="CVE-2023-3609" ref_url="https://www.suse.com/security/cve/CVE-2023-3609/" source="CVE"/>
		<reference ref_id="CVE-2023-3640" ref_url="https://www.suse.com/security/cve/CVE-2023-3640/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-3773" ref_url="https://www.suse.com/security/cve/CVE-2023-3773/" source="CVE"/>
		<reference ref_id="CVE-2023-39191" ref_url="https://www.suse.com/security/cve/CVE-2023-39191/" source="CVE"/>
		<reference ref_id="CVE-2023-4155" ref_url="https://www.suse.com/security/cve/CVE-2023-4155/" source="CVE"/>
		<reference ref_id="CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194/" source="CVE"/>
		<reference ref_id="CVE-2023-4206" ref_url="https://www.suse.com/security/cve/CVE-2023-4206/" source="CVE"/>
		<reference ref_id="CVE-2023-4207" ref_url="https://www.suse.com/security/cve/CVE-2023-4207/" source="CVE"/>
		<reference ref_id="CVE-2023-4208" ref_url="https://www.suse.com/security/cve/CVE-2023-4208/" source="CVE"/>
		<reference ref_id="CVE-2023-4273" ref_url="https://www.suse.com/security/cve/CVE-2023-4273/" source="CVE"/>
		<reference ref_id="CVE-2023-52707" ref_url="https://www.suse.com/security/cve/CVE-2023-52707/" source="CVE"/>
		<reference ref_id="CVE-2023-52734" ref_url="https://www.suse.com/security/cve/CVE-2023-52734/" source="CVE"/>
		<reference ref_id="CVE-2023-52735" ref_url="https://www.suse.com/security/cve/CVE-2023-52735/" source="CVE"/>
		<reference ref_id="CVE-2023-52928" ref_url="https://www.suse.com/security/cve/CVE-2023-52928/" source="CVE"/>
		<reference ref_id="CVE-2023-52931" ref_url="https://www.suse.com/security/cve/CVE-2023-52931/" source="CVE"/>
		<reference ref_id="CVE-2023-52937" ref_url="https://www.suse.com/security/cve/CVE-2023-52937/" source="CVE"/>
		<reference ref_id="CVE-2023-52938" ref_url="https://www.suse.com/security/cve/CVE-2023-52938/" source="CVE"/>
		<reference ref_id="CVE-2023-52977" ref_url="https://www.suse.com/security/cve/CVE-2023-52977/" source="CVE"/>
		<reference ref_id="CVE-2023-52981" ref_url="https://www.suse.com/security/cve/CVE-2023-52981/" source="CVE"/>
		<reference ref_id="CVE-2023-52986" ref_url="https://www.suse.com/security/cve/CVE-2023-52986/" source="CVE"/>
		<reference ref_id="CVE-2023-52988" ref_url="https://www.suse.com/security/cve/CVE-2023-52988/" source="CVE"/>
		<reference ref_id="CVE-2023-52991" ref_url="https://www.suse.com/security/cve/CVE-2023-52991/" source="CVE"/>
		<reference ref_id="CVE-2023-52992" ref_url="https://www.suse.com/security/cve/CVE-2023-52992/" source="CVE"/>
		<reference ref_id="CVE-2023-52993" ref_url="https://www.suse.com/security/cve/CVE-2023-52993/" source="CVE"/>
		<reference ref_id="CVE-2023-52994" ref_url="https://www.suse.com/security/cve/CVE-2023-52994/" source="CVE"/>
		<reference ref_id="CVE-2023-52997" ref_url="https://www.suse.com/security/cve/CVE-2023-52997/" source="CVE"/>
		<reference ref_id="CVE-2023-53002" ref_url="https://www.suse.com/security/cve/CVE-2023-53002/" source="CVE"/>
		<reference ref_id="CVE-2023-53006" ref_url="https://www.suse.com/security/cve/CVE-2023-53006/" source="CVE"/>
		<reference ref_id="CVE-2023-53009" ref_url="https://www.suse.com/security/cve/CVE-2023-53009/" source="CVE"/>
		<reference ref_id="CVE-2023-53010" ref_url="https://www.suse.com/security/cve/CVE-2023-53010/" source="CVE"/>
		<reference ref_id="CVE-2023-53012" ref_url="https://www.suse.com/security/cve/CVE-2023-53012/" source="CVE"/>
		<reference ref_id="CVE-2023-53013" ref_url="https://www.suse.com/security/cve/CVE-2023-53013/" source="CVE"/>
		<reference ref_id="CVE-2023-53014" ref_url="https://www.suse.com/security/cve/CVE-2023-53014/" source="CVE"/>
		<reference ref_id="CVE-2023-53015" ref_url="https://www.suse.com/security/cve/CVE-2023-53015/" source="CVE"/>
		<reference ref_id="CVE-2023-53024" ref_url="https://www.suse.com/security/cve/CVE-2023-53024/" source="CVE"/>
		<reference ref_id="CVE-2023-53025" ref_url="https://www.suse.com/security/cve/CVE-2023-53025/" source="CVE"/>
		<reference ref_id="CVE-2023-53026" ref_url="https://www.suse.com/security/cve/CVE-2023-53026/" source="CVE"/>
		<reference ref_id="CVE-2023-53028" ref_url="https://www.suse.com/security/cve/CVE-2023-53028/" source="CVE"/>
		<reference ref_id="CVE-2023-53031" ref_url="https://www.suse.com/security/cve/CVE-2023-53031/" source="CVE"/>
		<reference ref_id="CVE-2023-53036" ref_url="https://www.suse.com/security/cve/CVE-2023-53036/" source="CVE"/>
		<reference ref_id="CVE-2023-53038" ref_url="https://www.suse.com/security/cve/CVE-2023-53038/" source="CVE"/>
		<reference ref_id="CVE-2023-53039" ref_url="https://www.suse.com/security/cve/CVE-2023-53039/" source="CVE"/>
		<reference ref_id="CVE-2023-53042" ref_url="https://www.suse.com/security/cve/CVE-2023-53042/" source="CVE"/>
		<reference ref_id="CVE-2023-53044" ref_url="https://www.suse.com/security/cve/CVE-2023-53044/" source="CVE"/>
		<reference ref_id="CVE-2023-53050" ref_url="https://www.suse.com/security/cve/CVE-2023-53050/" source="CVE"/>
		<reference ref_id="CVE-2023-53051" ref_url="https://www.suse.com/security/cve/CVE-2023-53051/" source="CVE"/>
		<reference ref_id="CVE-2023-53053" ref_url="https://www.suse.com/security/cve/CVE-2023-53053/" source="CVE"/>
		<reference ref_id="CVE-2023-53056" ref_url="https://www.suse.com/security/cve/CVE-2023-53056/" source="CVE"/>
		<reference ref_id="CVE-2023-53058" ref_url="https://www.suse.com/security/cve/CVE-2023-53058/" source="CVE"/>
		<reference ref_id="CVE-2023-53060" ref_url="https://www.suse.com/security/cve/CVE-2023-53060/" source="CVE"/>
		<reference ref_id="CVE-2023-53065" ref_url="https://www.suse.com/security/cve/CVE-2023-53065/" source="CVE"/>
		<reference ref_id="CVE-2023-53070" ref_url="https://www.suse.com/security/cve/CVE-2023-53070/" source="CVE"/>
		<reference ref_id="CVE-2023-53071" ref_url="https://www.suse.com/security/cve/CVE-2023-53071/" source="CVE"/>
		<reference ref_id="CVE-2023-53072" ref_url="https://www.suse.com/security/cve/CVE-2023-53072/" source="CVE"/>
		<reference ref_id="CVE-2023-53073" ref_url="https://www.suse.com/security/cve/CVE-2023-53073/" source="CVE"/>
		<reference ref_id="CVE-2023-53077" ref_url="https://www.suse.com/security/cve/CVE-2023-53077/" source="CVE"/>
		<reference ref_id="CVE-2023-53078" ref_url="https://www.suse.com/security/cve/CVE-2023-53078/" source="CVE"/>
		<reference ref_id="CVE-2023-53079" ref_url="https://www.suse.com/security/cve/CVE-2023-53079/" source="CVE"/>
		<reference ref_id="CVE-2023-53084" ref_url="https://www.suse.com/security/cve/CVE-2023-53084/" source="CVE"/>
		<reference ref_id="CVE-2023-53085" ref_url="https://www.suse.com/security/cve/CVE-2023-53085/" source="CVE"/>
		<reference ref_id="CVE-2023-53086" ref_url="https://www.suse.com/security/cve/CVE-2023-53086/" source="CVE"/>
		<reference ref_id="CVE-2023-53087" ref_url="https://www.suse.com/security/cve/CVE-2023-53087/" source="CVE"/>
		<reference ref_id="CVE-2023-53088" ref_url="https://www.suse.com/security/cve/CVE-2023-53088/" source="CVE"/>
		<reference ref_id="CVE-2023-53089" ref_url="https://www.suse.com/security/cve/CVE-2023-53089/" source="CVE"/>
		<reference ref_id="CVE-2023-53090" ref_url="https://www.suse.com/security/cve/CVE-2023-53090/" source="CVE"/>
		<reference ref_id="CVE-2023-53095" ref_url="https://www.suse.com/security/cve/CVE-2023-53095/" source="CVE"/>
		<reference ref_id="CVE-2023-53096" ref_url="https://www.suse.com/security/cve/CVE-2023-53096/" source="CVE"/>
		<reference ref_id="CVE-2023-53100" ref_url="https://www.suse.com/security/cve/CVE-2023-53100/" source="CVE"/>
		<reference ref_id="CVE-2023-53102" ref_url="https://www.suse.com/security/cve/CVE-2023-53102/" source="CVE"/>
		<reference ref_id="CVE-2023-53103" ref_url="https://www.suse.com/security/cve/CVE-2023-53103/" source="CVE"/>
		<reference ref_id="CVE-2023-53105" ref_url="https://www.suse.com/security/cve/CVE-2023-53105/" source="CVE"/>
		<reference ref_id="CVE-2023-53107" ref_url="https://www.suse.com/security/cve/CVE-2023-53107/" source="CVE"/>
		<reference ref_id="CVE-2023-53108" ref_url="https://www.suse.com/security/cve/CVE-2023-53108/" source="CVE"/>
		<reference ref_id="CVE-2023-53110" ref_url="https://www.suse.com/security/cve/CVE-2023-53110/" source="CVE"/>
		<reference ref_id="CVE-2023-53112" ref_url="https://www.suse.com/security/cve/CVE-2023-53112/" source="CVE"/>
		<reference ref_id="CVE-2023-53113" ref_url="https://www.suse.com/security/cve/CVE-2023-53113/" source="CVE"/>
		<reference ref_id="CVE-2023-53114" ref_url="https://www.suse.com/security/cve/CVE-2023-53114/" source="CVE"/>
		<reference ref_id="CVE-2023-53116" ref_url="https://www.suse.com/security/cve/CVE-2023-53116/" source="CVE"/>
		<reference ref_id="CVE-2023-53120" ref_url="https://www.suse.com/security/cve/CVE-2023-53120/" source="CVE"/>
		<reference ref_id="CVE-2023-53121" ref_url="https://www.suse.com/security/cve/CVE-2023-53121/" source="CVE"/>
		<reference ref_id="CVE-2023-53124" ref_url="https://www.suse.com/security/cve/CVE-2023-53124/" source="CVE"/>
		<reference ref_id="CVE-2023-53126" ref_url="https://www.suse.com/security/cve/CVE-2023-53126/" source="CVE"/>
		<reference ref_id="CVE-2023-53129" ref_url="https://www.suse.com/security/cve/CVE-2023-53129/" source="CVE"/>
		<reference ref_id="CVE-2023-53132" ref_url="https://www.suse.com/security/cve/CVE-2023-53132/" source="CVE"/>
		<reference ref_id="CVE-2023-53168" ref_url="https://www.suse.com/security/cve/CVE-2023-53168/" source="CVE"/>
		<reference ref_id="CVE-2023-53171" ref_url="https://www.suse.com/security/cve/CVE-2023-53171/" source="CVE"/>
		<reference ref_id="CVE-2023-53185" ref_url="https://www.suse.com/security/cve/CVE-2023-53185/" source="CVE"/>
		<reference ref_id="CVE-2023-53188" ref_url="https://www.suse.com/security/cve/CVE-2023-53188/" source="CVE"/>
		<reference ref_id="CVE-2023-53197" ref_url="https://www.suse.com/security/cve/CVE-2023-53197/" source="CVE"/>
		<reference ref_id="CVE-2023-53198" ref_url="https://www.suse.com/security/cve/CVE-2023-53198/" source="CVE"/>
		<reference ref_id="CVE-2023-53205" ref_url="https://www.suse.com/security/cve/CVE-2023-53205/" source="CVE"/>
		<reference ref_id="CVE-2023-53211" ref_url="https://www.suse.com/security/cve/CVE-2023-53211/" source="CVE"/>
		<reference ref_id="CVE-2023-53213" ref_url="https://www.suse.com/security/cve/CVE-2023-53213/" source="CVE"/>
		<reference ref_id="CVE-2023-53218" ref_url="https://www.suse.com/security/cve/CVE-2023-53218/" source="CVE"/>
		<reference ref_id="CVE-2023-53224" ref_url="https://www.suse.com/security/cve/CVE-2023-53224/" source="CVE"/>
		<reference ref_id="CVE-2023-53229" ref_url="https://www.suse.com/security/cve/CVE-2023-53229/" source="CVE"/>
		<reference ref_id="CVE-2023-53232" ref_url="https://www.suse.com/security/cve/CVE-2023-53232/" source="CVE"/>
		<reference ref_id="CVE-2023-53233" ref_url="https://www.suse.com/security/cve/CVE-2023-53233/" source="CVE"/>
		<reference ref_id="CVE-2023-53241" ref_url="https://www.suse.com/security/cve/CVE-2023-53241/" source="CVE"/>
		<reference ref_id="CVE-2023-53245" ref_url="https://www.suse.com/security/cve/CVE-2023-53245/" source="CVE"/>
		<reference ref_id="CVE-2023-53254" ref_url="https://www.suse.com/security/cve/CVE-2023-53254/" source="CVE"/>
		<reference ref_id="CVE-2023-53268" ref_url="https://www.suse.com/security/cve/CVE-2023-53268/" source="CVE"/>
		<reference ref_id="CVE-2023-53292" ref_url="https://www.suse.com/security/cve/CVE-2023-53292/" source="CVE"/>
		<reference ref_id="CVE-2023-53296" ref_url="https://www.suse.com/security/cve/CVE-2023-53296/" source="CVE"/>
		<reference ref_id="CVE-2023-53299" ref_url="https://www.suse.com/security/cve/CVE-2023-53299/" source="CVE"/>
		<reference ref_id="CVE-2023-53319" ref_url="https://www.suse.com/security/cve/CVE-2023-53319/" source="CVE"/>
		<reference ref_id="CVE-2023-53320" ref_url="https://www.suse.com/security/cve/CVE-2023-53320/" source="CVE"/>
		<reference ref_id="CVE-2023-53333" ref_url="https://www.suse.com/security/cve/CVE-2023-53333/" source="CVE"/>
		<reference ref_id="CVE-2023-53334" ref_url="https://www.suse.com/security/cve/CVE-2023-53334/" source="CVE"/>
		<reference ref_id="CVE-2023-53359" ref_url="https://www.suse.com/security/cve/CVE-2023-53359/" source="CVE"/>
		<reference ref_id="CVE-2023-53363" ref_url="https://www.suse.com/security/cve/CVE-2023-53363/" source="CVE"/>
		<reference ref_id="CVE-2023-53366" ref_url="https://www.suse.com/security/cve/CVE-2023-53366/" source="CVE"/>
		<reference ref_id="CVE-2023-53372" ref_url="https://www.suse.com/security/cve/CVE-2023-53372/" source="CVE"/>
		<reference ref_id="CVE-2023-53376" ref_url="https://www.suse.com/security/cve/CVE-2023-53376/" source="CVE"/>
		<reference ref_id="CVE-2023-53383" ref_url="https://www.suse.com/security/cve/CVE-2023-53383/" source="CVE"/>
		<reference ref_id="CVE-2023-53387" ref_url="https://www.suse.com/security/cve/CVE-2023-53387/" source="CVE"/>
		<reference ref_id="CVE-2023-53390" ref_url="https://www.suse.com/security/cve/CVE-2023-53390/" source="CVE"/>
		<reference ref_id="CVE-2023-53392" ref_url="https://www.suse.com/security/cve/CVE-2023-53392/" source="CVE"/>
		<reference ref_id="CVE-2023-53398" ref_url="https://www.suse.com/security/cve/CVE-2023-53398/" source="CVE"/>
		<reference ref_id="CVE-2023-53400" ref_url="https://www.suse.com/security/cve/CVE-2023-53400/" source="CVE"/>
		<reference ref_id="CVE-2023-53408" ref_url="https://www.suse.com/security/cve/CVE-2023-53408/" source="CVE"/>
		<reference ref_id="CVE-2023-53409" ref_url="https://www.suse.com/security/cve/CVE-2023-53409/" source="CVE"/>
		<reference ref_id="CVE-2023-53410" ref_url="https://www.suse.com/security/cve/CVE-2023-53410/" source="CVE"/>
		<reference ref_id="CVE-2023-53422" ref_url="https://www.suse.com/security/cve/CVE-2023-53422/" source="CVE"/>
		<reference ref_id="CVE-2023-53430" ref_url="https://www.suse.com/security/cve/CVE-2023-53430/" source="CVE"/>
		<reference ref_id="CVE-2023-53431" ref_url="https://www.suse.com/security/cve/CVE-2023-53431/" source="CVE"/>
		<reference ref_id="CVE-2023-53433" ref_url="https://www.suse.com/security/cve/CVE-2023-53433/" source="CVE"/>
		<reference ref_id="CVE-2023-53437" ref_url="https://www.suse.com/security/cve/CVE-2023-53437/" source="CVE"/>
		<reference ref_id="CVE-2023-53443" ref_url="https://www.suse.com/security/cve/CVE-2023-53443/" source="CVE"/>
		<reference ref_id="CVE-2023-53453" ref_url="https://www.suse.com/security/cve/CVE-2023-53453/" source="CVE"/>
		<reference ref_id="CVE-2023-53461" ref_url="https://www.suse.com/security/cve/CVE-2023-53461/" source="CVE"/>
		<reference ref_id="CVE-2023-53464" ref_url="https://www.suse.com/security/cve/CVE-2023-53464/" source="CVE"/>
		<reference ref_id="CVE-2023-53466" ref_url="https://www.suse.com/security/cve/CVE-2023-53466/" source="CVE"/>
		<reference ref_id="CVE-2023-53477" ref_url="https://www.suse.com/security/cve/CVE-2023-53477/" source="CVE"/>
		<reference ref_id="CVE-2023-53479" ref_url="https://www.suse.com/security/cve/CVE-2023-53479/" source="CVE"/>
		<reference ref_id="CVE-2023-53489" ref_url="https://www.suse.com/security/cve/CVE-2023-53489/" source="CVE"/>
		<reference ref_id="CVE-2023-53492" ref_url="https://www.suse.com/security/cve/CVE-2023-53492/" source="CVE"/>
		<reference ref_id="CVE-2023-53499" ref_url="https://www.suse.com/security/cve/CVE-2023-53499/" source="CVE"/>
		<reference ref_id="CVE-2023-53511" ref_url="https://www.suse.com/security/cve/CVE-2023-53511/" source="CVE"/>
		<reference ref_id="CVE-2023-53512" ref_url="https://www.suse.com/security/cve/CVE-2023-53512/" source="CVE"/>
		<reference ref_id="CVE-2023-53517" ref_url="https://www.suse.com/security/cve/CVE-2023-53517/" source="CVE"/>
		<reference ref_id="CVE-2023-53521" ref_url="https://www.suse.com/security/cve/CVE-2023-53521/" source="CVE"/>
		<reference ref_id="CVE-2023-53524" ref_url="https://www.suse.com/security/cve/CVE-2023-53524/" source="CVE"/>
		<reference ref_id="CVE-2023-53532" ref_url="https://www.suse.com/security/cve/CVE-2023-53532/" source="CVE"/>
		<reference ref_id="CVE-2023-53549" ref_url="https://www.suse.com/security/cve/CVE-2023-53549/" source="CVE"/>
		<reference ref_id="CVE-2023-53553" ref_url="https://www.suse.com/security/cve/CVE-2023-53553/" source="CVE"/>
		<reference ref_id="CVE-2023-53556" ref_url="https://www.suse.com/security/cve/CVE-2023-53556/" source="CVE"/>
		<reference ref_id="CVE-2023-53561" ref_url="https://www.suse.com/security/cve/CVE-2023-53561/" source="CVE"/>
		<reference ref_id="CVE-2023-53563" ref_url="https://www.suse.com/security/cve/CVE-2023-53563/" source="CVE"/>
		<reference ref_id="CVE-2023-53566" ref_url="https://www.suse.com/security/cve/CVE-2023-53566/" source="CVE"/>
		<reference ref_id="CVE-2023-53575" ref_url="https://www.suse.com/security/cve/CVE-2023-53575/" source="CVE"/>
		<reference ref_id="CVE-2023-53576" ref_url="https://www.suse.com/security/cve/CVE-2023-53576/" source="CVE"/>
		<reference ref_id="CVE-2023-53578" ref_url="https://www.suse.com/security/cve/CVE-2023-53578/" source="CVE"/>
		<reference ref_id="CVE-2023-53582" ref_url="https://www.suse.com/security/cve/CVE-2023-53582/" source="CVE"/>
		<reference ref_id="CVE-2023-53591" ref_url="https://www.suse.com/security/cve/CVE-2023-53591/" source="CVE"/>
		<reference ref_id="CVE-2023-53594" ref_url="https://www.suse.com/security/cve/CVE-2023-53594/" source="CVE"/>
		<reference ref_id="CVE-2023-53598" ref_url="https://www.suse.com/security/cve/CVE-2023-53598/" source="CVE"/>
		<reference ref_id="CVE-2023-53602" ref_url="https://www.suse.com/security/cve/CVE-2023-53602/" source="CVE"/>
		<reference ref_id="CVE-2023-53605" ref_url="https://www.suse.com/security/cve/CVE-2023-53605/" source="CVE"/>
		<reference ref_id="CVE-2023-53607" ref_url="https://www.suse.com/security/cve/CVE-2023-53607/" source="CVE"/>
		<reference ref_id="CVE-2023-53609" ref_url="https://www.suse.com/security/cve/CVE-2023-53609/" source="CVE"/>
		<reference ref_id="CVE-2023-53620" ref_url="https://www.suse.com/security/cve/CVE-2023-53620/" source="CVE"/>
		<reference ref_id="CVE-2023-53623" ref_url="https://www.suse.com/security/cve/CVE-2023-53623/" source="CVE"/>
		<reference ref_id="CVE-2023-53624" ref_url="https://www.suse.com/security/cve/CVE-2023-53624/" source="CVE"/>
		<reference ref_id="CVE-2023-53625" ref_url="https://www.suse.com/security/cve/CVE-2023-53625/" source="CVE"/>
		<reference ref_id="CVE-2023-53626" ref_url="https://www.suse.com/security/cve/CVE-2023-53626/" source="CVE"/>
		<reference ref_id="CVE-2023-53634" ref_url="https://www.suse.com/security/cve/CVE-2023-53634/" source="CVE"/>
		<reference ref_id="CVE-2023-53635" ref_url="https://www.suse.com/security/cve/CVE-2023-53635/" source="CVE"/>
		<reference ref_id="CVE-2023-53639" ref_url="https://www.suse.com/security/cve/CVE-2023-53639/" source="CVE"/>
		<reference ref_id="CVE-2023-53640" ref_url="https://www.suse.com/security/cve/CVE-2023-53640/" source="CVE"/>
		<reference ref_id="CVE-2023-53641" ref_url="https://www.suse.com/security/cve/CVE-2023-53641/" source="CVE"/>
		<reference ref_id="CVE-2023-53643" ref_url="https://www.suse.com/security/cve/CVE-2023-53643/" source="CVE"/>
		<reference ref_id="CVE-2023-53646" ref_url="https://www.suse.com/security/cve/CVE-2023-53646/" source="CVE"/>
		<reference ref_id="CVE-2023-53656" ref_url="https://www.suse.com/security/cve/CVE-2023-53656/" source="CVE"/>
		<reference ref_id="CVE-2023-53669" ref_url="https://www.suse.com/security/cve/CVE-2023-53669/" source="CVE"/>
		<reference ref_id="CVE-2023-53670" ref_url="https://www.suse.com/security/cve/CVE-2023-53670/" source="CVE"/>
		<reference ref_id="CVE-2023-53671" ref_url="https://www.suse.com/security/cve/CVE-2023-53671/" source="CVE"/>
		<reference ref_id="CVE-2023-53675" ref_url="https://www.suse.com/security/cve/CVE-2023-53675/" source="CVE"/>
		<reference ref_id="CVE-2023-53677" ref_url="https://www.suse.com/security/cve/CVE-2023-53677/" source="CVE"/>
		<reference ref_id="CVE-2023-53678" ref_url="https://www.suse.com/security/cve/CVE-2023-53678/" source="CVE"/>
		<reference ref_id="CVE-2023-53679" ref_url="https://www.suse.com/security/cve/CVE-2023-53679/" source="CVE"/>
		<reference ref_id="CVE-2023-53705" ref_url="https://www.suse.com/security/cve/CVE-2023-53705/" source="CVE"/>
		<reference ref_id="CVE-2023-53706" ref_url="https://www.suse.com/security/cve/CVE-2023-53706/" source="CVE"/>
		<reference ref_id="CVE-2023-53710" ref_url="https://www.suse.com/security/cve/CVE-2023-53710/" source="CVE"/>
		<reference ref_id="CVE-2023-53716" ref_url="https://www.suse.com/security/cve/CVE-2023-53716/" source="CVE"/>
		<reference ref_id="CVE-2023-53717" ref_url="https://www.suse.com/security/cve/CVE-2023-53717/" source="CVE"/>
		<reference ref_id="CVE-2023-53746" ref_url="https://www.suse.com/security/cve/CVE-2023-53746/" source="CVE"/>
		<reference ref_id="CVE-2023-53753" ref_url="https://www.suse.com/security/cve/CVE-2023-53753/" source="CVE"/>
		<reference ref_id="CVE-2023-53755" ref_url="https://www.suse.com/security/cve/CVE-2023-53755/" source="CVE"/>
		<reference ref_id="CVE-2023-53756" ref_url="https://www.suse.com/security/cve/CVE-2023-53756/" source="CVE"/>
		<reference ref_id="CVE-2023-53760" ref_url="https://www.suse.com/security/cve/CVE-2023-53760/" source="CVE"/>
		<reference ref_id="CVE-2023-53764" ref_url="https://www.suse.com/security/cve/CVE-2023-53764/" source="CVE"/>
		<reference ref_id="CVE-2023-53767" ref_url="https://www.suse.com/security/cve/CVE-2023-53767/" source="CVE"/>
		<reference ref_id="CVE-2023-53780" ref_url="https://www.suse.com/security/cve/CVE-2023-53780/" source="CVE"/>
		<reference ref_id="CVE-2023-53786" ref_url="https://www.suse.com/security/cve/CVE-2023-53786/" source="CVE"/>
		<reference ref_id="CVE-2023-53789" ref_url="https://www.suse.com/security/cve/CVE-2023-53789/" source="CVE"/>
		<reference ref_id="CVE-2023-53792" ref_url="https://www.suse.com/security/cve/CVE-2023-53792/" source="CVE"/>
		<reference ref_id="CVE-2023-53795" ref_url="https://www.suse.com/security/cve/CVE-2023-53795/" source="CVE"/>
		<reference ref_id="CVE-2023-53803" ref_url="https://www.suse.com/security/cve/CVE-2023-53803/" source="CVE"/>
		<reference ref_id="CVE-2023-53814" ref_url="https://www.suse.com/security/cve/CVE-2023-53814/" source="CVE"/>
		<reference ref_id="CVE-2023-53816" ref_url="https://www.suse.com/security/cve/CVE-2023-53816/" source="CVE"/>
		<reference ref_id="CVE-2023-53832" ref_url="https://www.suse.com/security/cve/CVE-2023-53832/" source="CVE"/>
		<reference ref_id="CVE-2023-53852" ref_url="https://www.suse.com/security/cve/CVE-2023-53852/" source="CVE"/>
		<reference ref_id="CVE-2023-53866" ref_url="https://www.suse.com/security/cve/CVE-2023-53866/" source="CVE"/>
		<reference ref_id="CVE-2023-53867" ref_url="https://www.suse.com/security/cve/CVE-2023-53867/" source="CVE"/>
		<reference ref_id="CVE-2023-54004" ref_url="https://www.suse.com/security/cve/CVE-2023-54004/" source="CVE"/>
		<reference ref_id="CVE-2023-54011" ref_url="https://www.suse.com/security/cve/CVE-2023-54011/" source="CVE"/>
		<reference ref_id="CVE-2023-54015" ref_url="https://www.suse.com/security/cve/CVE-2023-54015/" source="CVE"/>
		<reference ref_id="CVE-2023-54024" ref_url="https://www.suse.com/security/cve/CVE-2023-54024/" source="CVE"/>
		<reference ref_id="CVE-2023-54029" ref_url="https://www.suse.com/security/cve/CVE-2023-54029/" source="CVE"/>
		<reference ref_id="CVE-2023-54034" ref_url="https://www.suse.com/security/cve/CVE-2023-54034/" source="CVE"/>
		<reference ref_id="CVE-2023-54036" ref_url="https://www.suse.com/security/cve/CVE-2023-54036/" source="CVE"/>
		<reference ref_id="CVE-2023-54037" ref_url="https://www.suse.com/security/cve/CVE-2023-54037/" source="CVE"/>
		<reference ref_id="CVE-2023-54040" ref_url="https://www.suse.com/security/cve/CVE-2023-54040/" source="CVE"/>
		<reference ref_id="CVE-2023-54041" ref_url="https://www.suse.com/security/cve/CVE-2023-54041/" source="CVE"/>
		<reference ref_id="CVE-2023-54043" ref_url="https://www.suse.com/security/cve/CVE-2023-54043/" source="CVE"/>
		<reference ref_id="CVE-2023-54053" ref_url="https://www.suse.com/security/cve/CVE-2023-54053/" source="CVE"/>
		<reference ref_id="CVE-2023-54055" ref_url="https://www.suse.com/security/cve/CVE-2023-54055/" source="CVE"/>
		<reference ref_id="CVE-2023-54057" ref_url="https://www.suse.com/security/cve/CVE-2023-54057/" source="CVE"/>
		<reference ref_id="CVE-2023-54071" ref_url="https://www.suse.com/security/cve/CVE-2023-54071/" source="CVE"/>
		<reference ref_id="CVE-2023-54073" ref_url="https://www.suse.com/security/cve/CVE-2023-54073/" source="CVE"/>
		<reference ref_id="CVE-2023-54074" ref_url="https://www.suse.com/security/cve/CVE-2023-54074/" source="CVE"/>
		<reference ref_id="CVE-2023-54085" ref_url="https://www.suse.com/security/cve/CVE-2023-54085/" source="CVE"/>
		<reference ref_id="CVE-2023-54088" ref_url="https://www.suse.com/security/cve/CVE-2023-54088/" source="CVE"/>
		<reference ref_id="CVE-2023-54092" ref_url="https://www.suse.com/security/cve/CVE-2023-54092/" source="CVE"/>
		<reference ref_id="CVE-2023-54097" ref_url="https://www.suse.com/security/cve/CVE-2023-54097/" source="CVE"/>
		<reference ref_id="CVE-2023-54098" ref_url="https://www.suse.com/security/cve/CVE-2023-54098/" source="CVE"/>
		<reference ref_id="CVE-2023-54102" ref_url="https://www.suse.com/security/cve/CVE-2023-54102/" source="CVE"/>
		<reference ref_id="CVE-2023-54108" ref_url="https://www.suse.com/security/cve/CVE-2023-54108/" source="CVE"/>
		<reference ref_id="CVE-2023-54123" ref_url="https://www.suse.com/security/cve/CVE-2023-54123/" source="CVE"/>
		<reference ref_id="CVE-2023-54129" ref_url="https://www.suse.com/security/cve/CVE-2023-54129/" source="CVE"/>
		<reference ref_id="CVE-2023-54131" ref_url="https://www.suse.com/security/cve/CVE-2023-54131/" source="CVE"/>
		<reference ref_id="CVE-2023-54144" ref_url="https://www.suse.com/security/cve/CVE-2023-54144/" source="CVE"/>
		<reference ref_id="CVE-2023-54174" ref_url="https://www.suse.com/security/cve/CVE-2023-54174/" source="CVE"/>
		<reference ref_id="CVE-2023-54176" ref_url="https://www.suse.com/security/cve/CVE-2023-54176/" source="CVE"/>
		<reference ref_id="CVE-2023-54191" ref_url="https://www.suse.com/security/cve/CVE-2023-54191/" source="CVE"/>
		<reference ref_id="CVE-2023-54195" ref_url="https://www.suse.com/security/cve/CVE-2023-54195/" source="CVE"/>
		<reference ref_id="CVE-2023-54200" ref_url="https://www.suse.com/security/cve/CVE-2023-54200/" source="CVE"/>
		<reference ref_id="CVE-2023-54202" ref_url="https://www.suse.com/security/cve/CVE-2023-54202/" source="CVE"/>
		<reference ref_id="CVE-2023-54206" ref_url="https://www.suse.com/security/cve/CVE-2023-54206/" source="CVE"/>
		<reference ref_id="CVE-2023-54216" ref_url="https://www.suse.com/security/cve/CVE-2023-54216/" source="CVE"/>
		<reference ref_id="CVE-2023-54233" ref_url="https://www.suse.com/security/cve/CVE-2023-54233/" source="CVE"/>
		<reference ref_id="CVE-2023-54234" ref_url="https://www.suse.com/security/cve/CVE-2023-54234/" source="CVE"/>
		<reference ref_id="CVE-2023-54238" ref_url="https://www.suse.com/security/cve/CVE-2023-54238/" source="CVE"/>
		<reference ref_id="CVE-2023-54239" ref_url="https://www.suse.com/security/cve/CVE-2023-54239/" source="CVE"/>
		<reference ref_id="CVE-2023-54245" ref_url="https://www.suse.com/security/cve/CVE-2023-54245/" source="CVE"/>
		<reference ref_id="CVE-2023-54259" ref_url="https://www.suse.com/security/cve/CVE-2023-54259/" source="CVE"/>
		<reference ref_id="CVE-2023-54262" ref_url="https://www.suse.com/security/cve/CVE-2023-54262/" source="CVE"/>
		<reference ref_id="CVE-2023-54265" ref_url="https://www.suse.com/security/cve/CVE-2023-54265/" source="CVE"/>
		<reference ref_id="CVE-2023-54269" ref_url="https://www.suse.com/security/cve/CVE-2023-54269/" source="CVE"/>
		<reference ref_id="CVE-2023-54270" ref_url="https://www.suse.com/security/cve/CVE-2023-54270/" source="CVE"/>
		<reference ref_id="CVE-2023-54273" ref_url="https://www.suse.com/security/cve/CVE-2023-54273/" source="CVE"/>
		<reference ref_id="CVE-2023-54275" ref_url="https://www.suse.com/security/cve/CVE-2023-54275/" source="CVE"/>
		<reference ref_id="CVE-2023-54276" ref_url="https://www.suse.com/security/cve/CVE-2023-54276/" source="CVE"/>
		<reference ref_id="CVE-2023-54286" ref_url="https://www.suse.com/security/cve/CVE-2023-54286/" source="CVE"/>
		<reference ref_id="CVE-2023-54294" ref_url="https://www.suse.com/security/cve/CVE-2023-54294/" source="CVE"/>
		<reference ref_id="CVE-2023-54300" ref_url="https://www.suse.com/security/cve/CVE-2023-54300/" source="CVE"/>
		<reference ref_id="CVE-2023-54306" ref_url="https://www.suse.com/security/cve/CVE-2023-54306/" source="CVE"/>
		<reference ref_id="CVE-2023-54308" ref_url="https://www.suse.com/security/cve/CVE-2023-54308/" source="CVE"/>
		<reference ref_id="CVE-2023-54309" ref_url="https://www.suse.com/security/cve/CVE-2023-54309/" source="CVE"/>
		<reference ref_id="CVE-2023-54317" ref_url="https://www.suse.com/security/cve/CVE-2023-54317/" source="CVE"/>
		<reference ref_id="CVE-2023-54320" ref_url="https://www.suse.com/security/cve/CVE-2023-54320/" source="CVE"/>
		<reference ref_id="CVE-2023-54321" ref_url="https://www.suse.com/security/cve/CVE-2023-54321/" source="CVE"/>
		<reference ref_id="CVE-2023-54325" ref_url="https://www.suse.com/security/cve/CVE-2023-54325/" source="CVE"/>
		<reference ref_id="CVE-2024-0443" ref_url="https://www.suse.com/security/cve/CVE-2024-0443/" source="CVE"/>
		<reference ref_id="CVE-2024-26649" ref_url="https://www.suse.com/security/cve/CVE-2024-26649/" source="CVE"/>
		<reference ref_id="CVE-2024-57876" ref_url="https://www.suse.com/security/cve/CVE-2024-57876/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6583.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6583.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47515/">CVE-2021-47515 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47515">CVE-2021-47515 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3523/">CVE-2022-3523 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3523">CVE-2022-3523 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3565/">CVE-2022-3565 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3594/">CVE-2022-3594 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3594">CVE-2022-3594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38457/">CVE-2022-38457 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38457">CVE-2022-38457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40133/">CVE-2022-40133 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40133">CVE-2022-40133 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42895/">CVE-2022-42895 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42895">CVE-2022-42895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48950/">CVE-2022-48950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48950">CVE-2022-48950 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48975/">CVE-2022-48975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48975">CVE-2022-48975 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48988/">CVE-2022-48988 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48988">CVE-2022-48988 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48991/">CVE-2022-48991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48991">CVE-2022-48991 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48997/">CVE-2022-48997 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48997">CVE-2022-48997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49028/">CVE-2022-49028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49028">CVE-2022-49028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49220/">CVE-2022-49220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49220">CVE-2022-49220 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49256/">CVE-2022-49256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49256">CVE-2022-49256 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49257/">CVE-2022-49257 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49257">CVE-2022-49257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49273/">CVE-2022-49273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49273">CVE-2022-49273 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49287/">CVE-2022-49287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49287">CVE-2022-49287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49316/">CVE-2022-49316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49316">CVE-2022-49316 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49321/">CVE-2022-49321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49321">CVE-2022-49321 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49339/">CVE-2022-49339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49339">CVE-2022-49339 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49344/">CVE-2022-49344 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49344">CVE-2022-49344 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49466/">CVE-2022-49466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49466">CVE-2022-49466 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49567/">CVE-2022-49567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49567">CVE-2022-49567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49653/">CVE-2022-49653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49653">CVE-2022-49653 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49687/">CVE-2022-49687 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49687">CVE-2022-49687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49699/">CVE-2022-49699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49699">CVE-2022-49699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49715/">CVE-2022-49715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49715">CVE-2022-49715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49716/">CVE-2022-49716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49716">CVE-2022-49716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49731/">CVE-2022-49731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49731">CVE-2022-49731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49746/">CVE-2022-49746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49746">CVE-2022-49746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49748/">CVE-2022-49748 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49748">CVE-2022-49748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49750/">CVE-2022-49750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49750">CVE-2022-49750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49752/">CVE-2022-49752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49752">CVE-2022-49752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49759/">CVE-2022-49759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49759">CVE-2022-49759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49760/">CVE-2022-49760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49760">CVE-2022-49760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49773/">CVE-2022-49773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49773">CVE-2022-49773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49774/">CVE-2022-49774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49774">CVE-2022-49774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49795/">CVE-2022-49795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49795">CVE-2022-49795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-49811/">CVE-2022-49811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49811">CVE-2022-49811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49827/">CVE-2022-49827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49827">CVE-2022-49827 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49837/">CVE-2022-49837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49837">CVE-2022-49837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49839/">CVE-2022-49839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49839">CVE-2022-49839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49855/">CVE-2022-49855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49855">CVE-2022-49855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49864/">CVE-2022-49864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49864">CVE-2022-49864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49873/">CVE-2022-49873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49873">CVE-2022-49873 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49875/">CVE-2022-49875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49875">CVE-2022-49875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49878/">CVE-2022-49878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49878">CVE-2022-49878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49882/">CVE-2022-49882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49882">CVE-2022-49882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49885/">CVE-2022-49885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49885">CVE-2022-49885 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49938/">CVE-2022-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49938">CVE-2022-49938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50004/">CVE-2022-50004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50004">CVE-2022-50004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50005/">CVE-2022-50005 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50005">CVE-2022-50005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50042/">CVE-2022-50042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50042">CVE-2022-50042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50064/">CVE-2022-50064 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50064">CVE-2022-50064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50066/">CVE-2022-50066 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50066">CVE-2022-50066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50072/">CVE-2022-50072 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50072">CVE-2022-50072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50076/">CVE-2022-50076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50076">CVE-2022-50076 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50087/">CVE-2022-50087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50087">CVE-2022-50087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50091/">CVE-2022-50091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50091">CVE-2022-50091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50107/">CVE-2022-50107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50107">CVE-2022-50107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50110/">CVE-2022-50110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50110">CVE-2022-50110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50117/">CVE-2022-50117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50117">CVE-2022-50117 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50127/">CVE-2022-50127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50127">CVE-2022-50127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50135/">CVE-2022-50135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50135">CVE-2022-50135 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50191/">CVE-2022-50191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50191">CVE-2022-50191 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50200/">CVE-2022-50200 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50200">CVE-2022-50200 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50201/">CVE-2022-50201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50201">CVE-2022-50201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50234/">CVE-2022-50234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50234">CVE-2022-50234 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50239/">CVE-2022-50239 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50239">CVE-2022-50239 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50246/">CVE-2022-50246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50246">CVE-2022-50246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50247/">CVE-2022-50247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50247">CVE-2022-50247 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50249/">CVE-2022-50249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50249">CVE-2022-50249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50250/">CVE-2022-50250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50250">CVE-2022-50250 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50258/">CVE-2022-50258 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50258">CVE-2022-50258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50269/">CVE-2022-50269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50269">CVE-2022-50269 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50272/">CVE-2022-50272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50272">CVE-2022-50272 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50275/">CVE-2022-50275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50275">CVE-2022-50275 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50276/">CVE-2022-50276 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50276">CVE-2022-50276 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50279/">CVE-2022-50279 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50279">CVE-2022-50279 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50287/">CVE-2022-50287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50287">CVE-2022-50287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-50290/">CVE-2022-50290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50290">CVE-2022-50290 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50295/">CVE-2022-50295 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50295">CVE-2022-50295 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50297/">CVE-2022-50297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50297">CVE-2022-50297 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50303/">CVE-2022-50303 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50303">CVE-2022-50303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50317/">CVE-2022-50317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50317">CVE-2022-50317 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50318/">CVE-2022-50318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50318">CVE-2022-50318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50322/">CVE-2022-50322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50322">CVE-2022-50322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50327/">CVE-2022-50327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50327">CVE-2022-50327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50329/">CVE-2022-50329 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50329">CVE-2022-50329 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50341/">CVE-2022-50341 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50341">CVE-2022-50341 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50342/">CVE-2022-50342 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50342">CVE-2022-50342 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50351/">CVE-2022-50351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50351">CVE-2022-50351 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50354/">CVE-2022-50354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50354">CVE-2022-50354 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50356/">CVE-2022-50356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50356">CVE-2022-50356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50357/">CVE-2022-50357 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50357">CVE-2022-50357 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50361/">CVE-2022-50361 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50361">CVE-2022-50361 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50369/">CVE-2022-50369 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50369">CVE-2022-50369 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50372/">CVE-2022-50372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50372">CVE-2022-50372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50389/">CVE-2022-50389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50389">CVE-2022-50389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50390/">CVE-2022-50390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50390">CVE-2022-50390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50391/">CVE-2022-50391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50391">CVE-2022-50391 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50393/">CVE-2022-50393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50393">CVE-2022-50393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50406/">CVE-2022-50406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50406">CVE-2022-50406 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50412/">CVE-2022-50412 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50412">CVE-2022-50412 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50416/">CVE-2022-50416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50416">CVE-2022-50416 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50423/">CVE-2022-50423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50423">CVE-2022-50423 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50426/">CVE-2022-50426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50426">CVE-2022-50426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50429/">CVE-2022-50429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50429">CVE-2022-50429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50440/">CVE-2022-50440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50440">CVE-2022-50440 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50444/">CVE-2022-50444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50444">CVE-2022-50444 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50453/">CVE-2022-50453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50453">CVE-2022-50453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50458/">CVE-2022-50458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50458">CVE-2022-50458 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50460/">CVE-2022-50460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50460">CVE-2022-50460 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50464/">CVE-2022-50464 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50464">CVE-2022-50464 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50470/">CVE-2022-50470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50470">CVE-2022-50470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50472/">CVE-2022-50472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50472">CVE-2022-50472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50473/">CVE-2022-50473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50473">CVE-2022-50473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50475/">CVE-2022-50475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50475">CVE-2022-50475 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50477/">CVE-2022-50477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50477">CVE-2022-50477 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50479/">CVE-2022-50479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50479">CVE-2022-50479 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50482/">CVE-2022-50482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50482">CVE-2022-50482 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50488/">CVE-2022-50488 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50488">CVE-2022-50488 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50489/">CVE-2022-50489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50489">CVE-2022-50489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50494/">CVE-2022-50494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50494">CVE-2022-50494 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50505/">CVE-2022-50505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50505">CVE-2022-50505 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50510/">CVE-2022-50510 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50510">CVE-2022-50510 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50515/">CVE-2022-50515 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50515">CVE-2022-50515 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50520/">CVE-2022-50520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50520">CVE-2022-50520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50527/">CVE-2022-50527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50527">CVE-2022-50527 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50528/">CVE-2022-50528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50528">CVE-2022-50528 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50532/">CVE-2022-50532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50532">CVE-2022-50532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50535/">CVE-2022-50535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50535">CVE-2022-50535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50536/">CVE-2022-50536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50536">CVE-2022-50536 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50540/">CVE-2022-50540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50540">CVE-2022-50540 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50543/">CVE-2022-50543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50543">CVE-2022-50543 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50544/">CVE-2022-50544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50544">CVE-2022-50544 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50550/">CVE-2022-50550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50550">CVE-2022-50550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50556/">CVE-2022-50556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50556">CVE-2022-50556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50558/">CVE-2022-50558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50558">CVE-2022-50558 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50562/">CVE-2022-50562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50562">CVE-2022-50562 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50578/">CVE-2022-50578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50578">CVE-2022-50578 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50582/">CVE-2022-50582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50582">CVE-2022-50582 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50616/">CVE-2022-50616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50616">CVE-2022-50616 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50617/">CVE-2022-50617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50617">CVE-2022-50617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50619/">CVE-2022-50619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50619">CVE-2022-50619 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50626/">CVE-2022-50626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50626">CVE-2022-50626 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50627/">CVE-2022-50627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50627">CVE-2022-50627 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50628/">CVE-2022-50628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50628">CVE-2022-50628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50630/">CVE-2022-50630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50630">CVE-2022-50630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50632/">CVE-2022-50632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50632">CVE-2022-50632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50633/">CVE-2022-50633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50633">CVE-2022-50633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50636/">CVE-2022-50636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50636">CVE-2022-50636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50639/">CVE-2022-50639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50639">CVE-2022-50639 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50643/">CVE-2022-50643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50643">CVE-2022-50643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50645/">CVE-2022-50645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50645">CVE-2022-50645 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50650/">CVE-2022-50650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50650">CVE-2022-50650 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50658/">CVE-2022-50658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50658">CVE-2022-50658 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50667/">CVE-2022-50667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50667">CVE-2022-50667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50671/">CVE-2022-50671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50671">CVE-2022-50671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50675/">CVE-2022-50675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50675">CVE-2022-50675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50677/">CVE-2022-50677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50677">CVE-2022-50677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50699/">CVE-2022-50699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50699">CVE-2022-50699 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50700/">CVE-2022-50700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50700">CVE-2022-50700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50701/">CVE-2022-50701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50701">CVE-2022-50701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50704/">CVE-2022-50704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50704">CVE-2022-50704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50705/">CVE-2022-50705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50705">CVE-2022-50705 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50710/">CVE-2022-50710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50710">CVE-2022-50710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50712/">CVE-2022-50712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50712">CVE-2022-50712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50718/">CVE-2022-50718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50718">CVE-2022-50718 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50721/">CVE-2022-50721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50721">CVE-2022-50721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50724/">CVE-2022-50724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50724">CVE-2022-50724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50728/">CVE-2022-50728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50728">CVE-2022-50728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50733/">CVE-2022-50733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50733">CVE-2022-50733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50735/">CVE-2022-50735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50735">CVE-2022-50735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50740/">CVE-2022-50740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50740">CVE-2022-50740 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50750/">CVE-2022-50750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50750">CVE-2022-50750 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50756/">CVE-2022-50756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50756">CVE-2022-50756 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50760/">CVE-2022-50760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50760">CVE-2022-50760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50771/">CVE-2022-50771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50771">CVE-2022-50771 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50772/">CVE-2022-50772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50772">CVE-2022-50772 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50781/">CVE-2022-50781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50781">CVE-2022-50781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50784/">CVE-2022-50784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50784">CVE-2022-50784 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50809/">CVE-2022-50809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50809">CVE-2022-50809 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50817/">CVE-2022-50817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50817">CVE-2022-50817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50819/">CVE-2022-50819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50819">CVE-2022-50819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50820/">CVE-2022-50820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50820">CVE-2022-50820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50822/">CVE-2022-50822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50822">CVE-2022-50822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50823/">CVE-2022-50823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50823">CVE-2022-50823 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50824/">CVE-2022-50824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50824">CVE-2022-50824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50825/">CVE-2022-50825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50825">CVE-2022-50825 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-50829/">CVE-2022-50829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50829">CVE-2022-50829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50832/">CVE-2022-50832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50832">CVE-2022-50832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50842/">CVE-2022-50842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50842">CVE-2022-50842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50844/">CVE-2022-50844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50844">CVE-2022-50844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50847/">CVE-2022-50847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50847">CVE-2022-50847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50856/">CVE-2022-50856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50856">CVE-2022-50856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50862/">CVE-2022-50862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50862">CVE-2022-50862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50865/">CVE-2022-50865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50865">CVE-2022-50865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50878/">CVE-2022-50878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50878">CVE-2022-50878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50881/">CVE-2022-50881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50881">CVE-2022-50881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50882/">CVE-2022-50882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50882">CVE-2022-50882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50883/">CVE-2022-50883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50883">CVE-2022-50883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50885/">CVE-2022-50885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50885">CVE-2022-50885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0597/">CVE-2023-0597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0597">CVE-2023-0597 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1073/">CVE-2023-1073 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1073">CVE-2023-1073 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1074/">CVE-2023-1074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1074">CVE-2023-1074 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1075/">CVE-2023-1075 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1075">CVE-2023-1075 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1076/">CVE-2023-1076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1077/">CVE-2023-1077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1079/">CVE-2023-1079 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-1249/">CVE-2023-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1249">CVE-2023-1249 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-1252/">CVE-2023-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1252">CVE-2023-1252 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1380/">CVE-2023-1380 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1652/">CVE-2023-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1838/">CVE-2023-1838 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1838">CVE-2023-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1855/">CVE-2023-1855 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1989/">CVE-2023-1989 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2269/">CVE-2023-2269 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26545/">CVE-2023-26545 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-30456/">CVE-2023-30456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3141/">CVE-2023-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3161/">CVE-2023-3161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3212/">CVE-2023-3212 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3268/">CVE-2023-3268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33203/">CVE-2023-33203 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33203">CVE-2023-33203 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3358/">CVE-2023-3358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3358">CVE-2023-3358 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-33951/">CVE-2023-33951 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33951">CVE-2023-33951 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-33952/">CVE-2023-33952 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33952">CVE-2023-33952 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35825/">CVE-2023-35825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-35825">CVE-2023-35825 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3609/">CVE-2023-3609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3640/">CVE-2023-3640 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3640">CVE-2023-3640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3773/">CVE-2023-3773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3773">CVE-2023-3773 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39191/">CVE-2023-39191 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39191">CVE-2023-39191 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4155/">CVE-2023-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4206/">CVE-2023-4206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4206">CVE-2023-4206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4207/">CVE-2023-4207 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4207">CVE-2023-4207 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4208/">CVE-2023-4208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4208">CVE-2023-4208 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4273/">CVE-2023-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52707/">CVE-2023-52707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52707">CVE-2023-52707 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52734/">CVE-2023-52734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52734">CVE-2023-52734 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52735/">CVE-2023-52735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52735">CVE-2023-52735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52928/">CVE-2023-52928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52928">CVE-2023-52928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52931/">CVE-2023-52931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52931">CVE-2023-52931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52937/">CVE-2023-52937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52937">CVE-2023-52937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52938/">CVE-2023-52938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52938">CVE-2023-52938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52977/">CVE-2023-52977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52977">CVE-2023-52977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52981/">CVE-2023-52981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52981">CVE-2023-52981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52986/">CVE-2023-52986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52986">CVE-2023-52986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52988/">CVE-2023-52988 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52988">CVE-2023-52988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52991/">CVE-2023-52991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52991">CVE-2023-52991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52992/">CVE-2023-52992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52992">CVE-2023-52992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52993/">CVE-2023-52993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52993">CVE-2023-52993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52994/">CVE-2023-52994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52994">CVE-2023-52994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52997/">CVE-2023-52997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52997">CVE-2023-52997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53002/">CVE-2023-53002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53002">CVE-2023-53002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53006/">CVE-2023-53006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53006">CVE-2023-53006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53009/">CVE-2023-53009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53009">CVE-2023-53009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53010/">CVE-2023-53010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53010">CVE-2023-53010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53012/">CVE-2023-53012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53012">CVE-2023-53012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53013/">CVE-2023-53013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53013">CVE-2023-53013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53014/">CVE-2023-53014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53014">CVE-2023-53014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53015/">CVE-2023-53015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53015">CVE-2023-53015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53024/">CVE-2023-53024 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53024">CVE-2023-53024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53025/">CVE-2023-53025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53025">CVE-2023-53025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53026/">CVE-2023-53026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53026">CVE-2023-53026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53028/">CVE-2023-53028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53028">CVE-2023-53028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53031/">CVE-2023-53031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53031">CVE-2023-53031 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53036/">CVE-2023-53036 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53036">CVE-2023-53036 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53038/">CVE-2023-53038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53038">CVE-2023-53038 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53039/">CVE-2023-53039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53039">CVE-2023-53039 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53042/">CVE-2023-53042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53042">CVE-2023-53042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53044/">CVE-2023-53044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53044">CVE-2023-53044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53050/">CVE-2023-53050 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53050">CVE-2023-53050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53051/">CVE-2023-53051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53051">CVE-2023-53051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53053/">CVE-2023-53053 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53053">CVE-2023-53053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53056/">CVE-2023-53056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53056">CVE-2023-53056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53058/">CVE-2023-53058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53058">CVE-2023-53058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53060/">CVE-2023-53060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53060">CVE-2023-53060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53065/">CVE-2023-53065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53065">CVE-2023-53065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53070/">CVE-2023-53070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53070">CVE-2023-53070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53071/">CVE-2023-53071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53071">CVE-2023-53071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53072/">CVE-2023-53072 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53072">CVE-2023-53072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53073/">CVE-2023-53073 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53073">CVE-2023-53073 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53077/">CVE-2023-53077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53077">CVE-2023-53077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53078/">CVE-2023-53078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53078">CVE-2023-53078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53079/">CVE-2023-53079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53079">CVE-2023-53079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53084/">CVE-2023-53084 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53084">CVE-2023-53084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53085/">CVE-2023-53085 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53085">CVE-2023-53085 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53086/">CVE-2023-53086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53086">CVE-2023-53086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53087/">CVE-2023-53087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53087">CVE-2023-53087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53088/">CVE-2023-53088 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53088">CVE-2023-53088 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53089/">CVE-2023-53089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53089">CVE-2023-53089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53090/">CVE-2023-53090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53090">CVE-2023-53090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53095/">CVE-2023-53095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53095">CVE-2023-53095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53096/">CVE-2023-53096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53096">CVE-2023-53096 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53100/">CVE-2023-53100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53100">CVE-2023-53100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53102/">CVE-2023-53102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53102">CVE-2023-53102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53103/">CVE-2023-53103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53103">CVE-2023-53103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53105/">CVE-2023-53105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53105">CVE-2023-53105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53107/">CVE-2023-53107 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53107">CVE-2023-53107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53108/">CVE-2023-53108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53108">CVE-2023-53108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53110/">CVE-2023-53110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53110">CVE-2023-53110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53112/">CVE-2023-53112 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53112">CVE-2023-53112 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53113/">CVE-2023-53113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53113">CVE-2023-53113 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53114/">CVE-2023-53114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53114">CVE-2023-53114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53116/">CVE-2023-53116 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53116">CVE-2023-53116 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53120/">CVE-2023-53120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53120">CVE-2023-53120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53121/">CVE-2023-53121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53121">CVE-2023-53121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53124/">CVE-2023-53124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53124">CVE-2023-53124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53126/">CVE-2023-53126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53126">CVE-2023-53126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53129/">CVE-2023-53129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53129">CVE-2023-53129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53132/">CVE-2023-53132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53132">CVE-2023-53132 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53168/">CVE-2023-53168 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53168">CVE-2023-53168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53171/">CVE-2023-53171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53171">CVE-2023-53171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53185/">CVE-2023-53185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53185">CVE-2023-53185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53188/">CVE-2023-53188 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53188">CVE-2023-53188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53197/">CVE-2023-53197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53197">CVE-2023-53197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53198/">CVE-2023-53198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53198">CVE-2023-53198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53205/">CVE-2023-53205 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53205">CVE-2023-53205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53211/">CVE-2023-53211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53211">CVE-2023-53211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53213/">CVE-2023-53213 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53213">CVE-2023-53213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53218/">CVE-2023-53218 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53218">CVE-2023-53218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53224/">CVE-2023-53224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53224">CVE-2023-53224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53229/">CVE-2023-53229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53229">CVE-2023-53229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53232/">CVE-2023-53232 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53232">CVE-2023-53232 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53233/">CVE-2023-53233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53233">CVE-2023-53233 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53241/">CVE-2023-53241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53241">CVE-2023-53241 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53245/">CVE-2023-53245 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53245">CVE-2023-53245 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53254/">CVE-2023-53254 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53254">CVE-2023-53254 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53268/">CVE-2023-53268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53268">CVE-2023-53268 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53292/">CVE-2023-53292 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53292">CVE-2023-53292 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53296/">CVE-2023-53296 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53296">CVE-2023-53296 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53299/">CVE-2023-53299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53299">CVE-2023-53299 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53319/">CVE-2023-53319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53319">CVE-2023-53319 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53320/">CVE-2023-53320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53320">CVE-2023-53320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53333/">CVE-2023-53333 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53333">CVE-2023-53333 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53334/">CVE-2023-53334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53334">CVE-2023-53334 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53359/">CVE-2023-53359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53359">CVE-2023-53359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53363/">CVE-2023-53363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53363">CVE-2023-53363 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53366/">CVE-2023-53366 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53366">CVE-2023-53366 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53372/">CVE-2023-53372 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53372">CVE-2023-53372 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53376/">CVE-2023-53376 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53376">CVE-2023-53376 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53383/">CVE-2023-53383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53383">CVE-2023-53383 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53387/">CVE-2023-53387 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53387">CVE-2023-53387 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53390/">CVE-2023-53390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53390">CVE-2023-53390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53392/">CVE-2023-53392 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53392">CVE-2023-53392 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53398/">CVE-2023-53398 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53398">CVE-2023-53398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53400/">CVE-2023-53400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53400">CVE-2023-53400 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53408/">CVE-2023-53408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53408">CVE-2023-53408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53409/">CVE-2023-53409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53409">CVE-2023-53409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53410/">CVE-2023-53410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53410">CVE-2023-53410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53422/">CVE-2023-53422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53422">CVE-2023-53422 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53430/">CVE-2023-53430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53430">CVE-2023-53430 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53431/">CVE-2023-53431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53431">CVE-2023-53431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53433/">CVE-2023-53433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53433">CVE-2023-53433 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53437/">CVE-2023-53437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53437">CVE-2023-53437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53443/">CVE-2023-53443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53443">CVE-2023-53443 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53453/">CVE-2023-53453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53453">CVE-2023-53453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53461/">CVE-2023-53461 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53461">CVE-2023-53461 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53464/">CVE-2023-53464 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53464">CVE-2023-53464 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53466/">CVE-2023-53466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53466">CVE-2023-53466 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53477/">CVE-2023-53477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53477">CVE-2023-53477 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53479/">CVE-2023-53479 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53479">CVE-2023-53479 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53489/">CVE-2023-53489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53489">CVE-2023-53489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53492/">CVE-2023-53492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53492">CVE-2023-53492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53499/">CVE-2023-53499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53499">CVE-2023-53499 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53511/">CVE-2023-53511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53511">CVE-2023-53511 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53512/">CVE-2023-53512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53512">CVE-2023-53512 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53517/">CVE-2023-53517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53517">CVE-2023-53517 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53521/">CVE-2023-53521 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53521">CVE-2023-53521 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53524/">CVE-2023-53524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53524">CVE-2023-53524 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53532/">CVE-2023-53532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53532">CVE-2023-53532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53549/">CVE-2023-53549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53549">CVE-2023-53549 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53553/">CVE-2023-53553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53553">CVE-2023-53553 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53556/">CVE-2023-53556 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53556">CVE-2023-53556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53561/">CVE-2023-53561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53561">CVE-2023-53561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53563/">CVE-2023-53563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53563">CVE-2023-53563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53566/">CVE-2023-53566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53566">CVE-2023-53566 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53575/">CVE-2023-53575 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53575">CVE-2023-53575 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53576/">CVE-2023-53576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53576">CVE-2023-53576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53578/">CVE-2023-53578 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53578">CVE-2023-53578 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53582/">CVE-2023-53582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53582">CVE-2023-53582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53591/">CVE-2023-53591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53591">CVE-2023-53591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53594/">CVE-2023-53594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53594">CVE-2023-53594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53598/">CVE-2023-53598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53598">CVE-2023-53598 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53602/">CVE-2023-53602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53602">CVE-2023-53602 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53605/">CVE-2023-53605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53605">CVE-2023-53605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53607/">CVE-2023-53607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53607">CVE-2023-53607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53609/">CVE-2023-53609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53609">CVE-2023-53609 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53620/">CVE-2023-53620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53620">CVE-2023-53620 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53623/">CVE-2023-53623 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53623">CVE-2023-53623 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53624/">CVE-2023-53624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53624">CVE-2023-53624 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53625/">CVE-2023-53625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53625">CVE-2023-53625 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53626/">CVE-2023-53626 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53626">CVE-2023-53626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53634/">CVE-2023-53634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53634">CVE-2023-53634 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53635/">CVE-2023-53635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53635">CVE-2023-53635 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53639/">CVE-2023-53639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53639">CVE-2023-53639 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53640/">CVE-2023-53640 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53640">CVE-2023-53640 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53641/">CVE-2023-53641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53641">CVE-2023-53641 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53643/">CVE-2023-53643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53643">CVE-2023-53643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53646/">CVE-2023-53646 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53646">CVE-2023-53646 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53656/">CVE-2023-53656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53656">CVE-2023-53656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53669/">CVE-2023-53669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53669">CVE-2023-53669 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53670/">CVE-2023-53670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53670">CVE-2023-53670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53671/">CVE-2023-53671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53671">CVE-2023-53671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53675/">CVE-2023-53675 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53675">CVE-2023-53675 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53677/">CVE-2023-53677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53677">CVE-2023-53677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53678/">CVE-2023-53678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53678">CVE-2023-53678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53679/">CVE-2023-53679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53679">CVE-2023-53679 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53705/">CVE-2023-53705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53705">CVE-2023-53705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53706/">CVE-2023-53706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53706">CVE-2023-53706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53710/">CVE-2023-53710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53710">CVE-2023-53710 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53716/">CVE-2023-53716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53716">CVE-2023-53716 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53717/">CVE-2023-53717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53717">CVE-2023-53717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53746/">CVE-2023-53746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53746">CVE-2023-53746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53753/">CVE-2023-53753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53753">CVE-2023-53753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53755/">CVE-2023-53755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53755">CVE-2023-53755 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53756/">CVE-2023-53756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53756">CVE-2023-53756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53760/">CVE-2023-53760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53760">CVE-2023-53760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53764/">CVE-2023-53764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53764">CVE-2023-53764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53767/">CVE-2023-53767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53767">CVE-2023-53767 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-53780/">CVE-2023-53780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53780">CVE-2023-53780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53786/">CVE-2023-53786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53786">CVE-2023-53786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53789/">CVE-2023-53789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53789">CVE-2023-53789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53792/">CVE-2023-53792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53792">CVE-2023-53792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53795/">CVE-2023-53795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53795">CVE-2023-53795 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53803/">CVE-2023-53803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53803">CVE-2023-53803 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53814/">CVE-2023-53814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53814">CVE-2023-53814 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-53816/">CVE-2023-53816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53816">CVE-2023-53816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53832/">CVE-2023-53832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53832">CVE-2023-53832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53852/">CVE-2023-53852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53852">CVE-2023-53852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53866/">CVE-2023-53866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53866">CVE-2023-53866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53867/">CVE-2023-53867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53867">CVE-2023-53867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54004/">CVE-2023-54004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54004">CVE-2023-54004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54011/">CVE-2023-54011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54011">CVE-2023-54011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54015/">CVE-2023-54015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54015">CVE-2023-54015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54024/">CVE-2023-54024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54024">CVE-2023-54024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-54029/">CVE-2023-54029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54029">CVE-2023-54029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54034/">CVE-2023-54034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54034">CVE-2023-54034 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54036/">CVE-2023-54036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54036">CVE-2023-54036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54037/">CVE-2023-54037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54037">CVE-2023-54037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54040/">CVE-2023-54040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54040">CVE-2023-54040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54041/">CVE-2023-54041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54041">CVE-2023-54041 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54043/">CVE-2023-54043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54043">CVE-2023-54043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54053/">CVE-2023-54053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54053">CVE-2023-54053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54055/">CVE-2023-54055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54055">CVE-2023-54055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54057/">CVE-2023-54057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54057">CVE-2023-54057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54071/">CVE-2023-54071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54071">CVE-2023-54071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54073/">CVE-2023-54073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54073">CVE-2023-54073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54074/">CVE-2023-54074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54074">CVE-2023-54074 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54085/">CVE-2023-54085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54085">CVE-2023-54085 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54088/">CVE-2023-54088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54088">CVE-2023-54088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54092/">CVE-2023-54092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54092">CVE-2023-54092 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54097/">CVE-2023-54097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54097">CVE-2023-54097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54098/">CVE-2023-54098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54098">CVE-2023-54098 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54102/">CVE-2023-54102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54102">CVE-2023-54102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54108/">CVE-2023-54108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54108">CVE-2023-54108 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54123/">CVE-2023-54123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54123">CVE-2023-54123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54129/">CVE-2023-54129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54129">CVE-2023-54129 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54131/">CVE-2023-54131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54131">CVE-2023-54131 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54144/">CVE-2023-54144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54144">CVE-2023-54144 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54174/">CVE-2023-54174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54174">CVE-2023-54174 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54176/">CVE-2023-54176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54176">CVE-2023-54176 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54191/">CVE-2023-54191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54191">CVE-2023-54191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54195/">CVE-2023-54195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54195">CVE-2023-54195 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54200/">CVE-2023-54200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54200">CVE-2023-54200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54202/">CVE-2023-54202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54202">CVE-2023-54202 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54206/">CVE-2023-54206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54206">CVE-2023-54206 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54216/">CVE-2023-54216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54216">CVE-2023-54216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54233/">CVE-2023-54233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54233">CVE-2023-54233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54234/">CVE-2023-54234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54234">CVE-2023-54234 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54238/">CVE-2023-54238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54238">CVE-2023-54238 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54239/">CVE-2023-54239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54239">CVE-2023-54239 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54245/">CVE-2023-54245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54245">CVE-2023-54245 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54259/">CVE-2023-54259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54259">CVE-2023-54259 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54262/">CVE-2023-54262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54262">CVE-2023-54262 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54265/">CVE-2023-54265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54265">CVE-2023-54265 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54269/">CVE-2023-54269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54269">CVE-2023-54269 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54270/">CVE-2023-54270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54270">CVE-2023-54270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54273/">CVE-2023-54273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54273">CVE-2023-54273 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54275/">CVE-2023-54275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54275">CVE-2023-54275 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54276/">CVE-2023-54276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54276">CVE-2023-54276 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54286/">CVE-2023-54286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54286">CVE-2023-54286 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54294/">CVE-2023-54294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54294">CVE-2023-54294 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54300/">CVE-2023-54300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54300">CVE-2023-54300 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54306/">CVE-2023-54306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54306">CVE-2023-54306 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54308/">CVE-2023-54308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54308">CVE-2023-54308 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54309/">CVE-2023-54309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54309">CVE-2023-54309 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54317/">CVE-2023-54317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54317">CVE-2023-54317 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54320/">CVE-2023-54320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54320">CVE-2023-54320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54321/">CVE-2023-54321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-54321">CVE-2023-54321 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54325/">CVE-2023-54325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54325">CVE-2023-54325 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0443/">CVE-2024-0443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0443">CVE-2024-0443 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26649/">CVE-2024-26649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26649">CVE-2024-26649 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57876/">CVE-2024-57876 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4001" version="1" class="patch">
	<metadata>
		<title>security update for opensc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-2977" ref_url="https://www.suse.com/security/cve/CVE-2023-2977/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6587.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6587.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2977/">CVE-2023-2977 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2977">CVE-2023-2977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811134" comment="opensc-0.23.0-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4002" version="1" class="patch">
	<metadata>
		<title>security update for binutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-4285" ref_url="https://www.suse.com/security/cve/CVE-2022-4285/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6593.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6593.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4285/">CVE-2022-4285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4285">CVE-2022-4285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811135" comment="binutils-2.35.2-42.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811136" comment="binutils-devel-2.35.2-42.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811137" comment="binutils-gold-2.35.2-42.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4003" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-27635" ref_url="https://www.suse.com/security/cve/CVE-2022-27635/" source="CVE"/>
		<reference ref_id="CVE-2022-36351" ref_url="https://www.suse.com/security/cve/CVE-2022-36351/" source="CVE"/>
		<reference ref_id="CVE-2022-38076" ref_url="https://www.suse.com/security/cve/CVE-2022-38076/" source="CVE"/>
		<reference ref_id="CVE-2022-40964" ref_url="https://www.suse.com/security/cve/CVE-2022-40964/" source="CVE"/>
		<reference ref_id="CVE-2022-46329" ref_url="https://www.suse.com/security/cve/CVE-2022-46329/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6595.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6595.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-27635/">CVE-2022-27635 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27635">CVE-2022-27635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36351/">CVE-2022-36351 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36351">CVE-2022-36351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38076/">CVE-2022-38076 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38076">CVE-2022-38076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40964/">CVE-2022-40964 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40964">CVE-2022-40964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46329/">CVE-2022-46329 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46329">CVE-2022-46329 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811138" comment="iwl100-firmware-39.31.5.1-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811139" comment="iwl1000-firmware-39.31.5.1-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811140" comment="iwl105-firmware-18.168.6.1-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811141" comment="iwl135-firmware-18.168.6.1-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811142" comment="iwl2000-firmware-18.168.6.1-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811143" comment="iwl2030-firmware-18.168.6.1-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811144" comment="iwl3160-firmware-25.30.13.0-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811145" comment="iwl5000-firmware-8.83.5.1_1-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811146" comment="iwl5150-firmware-8.24.2.2-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811147" comment="iwl6000g2a-firmware-18.168.6.1-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811148" comment="iwl6000g2b-firmware-18.168.6.1-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811149" comment="iwl6050-firmware-41.28.5.1-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811150" comment="iwl7260-firmware-25.30.13.0-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811151" comment="libertas-sd8787-firmware-20230814-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811152" comment="linux-firmware-20230814-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811153" comment="linux-firmware-whence-20230814-140.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811154" comment="netronome-firmware-20230814-140.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4004" version="1" class="patch">
	<metadata>
		<title>security update for cups (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-32324" ref_url="https://www.suse.com/security/cve/CVE-2023-32324/" source="CVE"/>
		<reference ref_id="CVE-2023-34241" ref_url="https://www.suse.com/security/cve/CVE-2023-34241/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6596.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6596.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32324/">CVE-2023-32324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32324">CVE-2023-32324 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34241/">CVE-2023-34241 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34241">CVE-2023-34241 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811155" comment="cups-2.3.3op2-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811156" comment="cups-client-2.3.3op2-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811157" comment="cups-devel-2.3.3op2-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811158" comment="cups-filesystem-2.3.3op2-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811159" comment="cups-ipptool-2.3.3op2-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811160" comment="cups-libs-2.3.3op2-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811161" comment="cups-lpd-2.3.3op2-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811162" comment="cups-printerapp-2.3.3op2-21.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4005" version="1" class="patch">
	<metadata>
		<title>security update for python-cryptography (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6615.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6615.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811163" comment="python3-cryptography-36.0.1-4.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4006" version="1" class="patch">
	<metadata>
		<title>security update for protobuf-c (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-48468" ref_url="https://www.suse.com/security/cve/CVE-2022-48468/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6621.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6621.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48468/">CVE-2022-48468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48468">CVE-2022-48468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811164" comment="protobuf-c-1.3.3-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811165" comment="protobuf-c-compiler-1.3.3-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811166" comment="protobuf-c-devel-1.3.3-13.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4007" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-29499" ref_url="https://www.suse.com/security/cve/CVE-2023-29499/" source="CVE"/>
		<reference ref_id="CVE-2023-32611" ref_url="https://www.suse.com/security/cve/CVE-2023-32611/" source="CVE"/>
		<reference ref_id="CVE-2023-32665" ref_url="https://www.suse.com/security/cve/CVE-2023-32665/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6631.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6631.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29499/">CVE-2023-29499 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29499">CVE-2023-29499 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32611/">CVE-2023-32611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32611">CVE-2023-32611 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32665/">CVE-2023-32665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32665">CVE-2023-32665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810802" comment="glib2-2.68.4-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810803" comment="glib2-devel-2.68.4-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810804" comment="glib2-doc-2.68.4-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810805" comment="glib2-static-2.68.4-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810806" comment="glib2-tests-2.68.4-11.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4008" version="1" class="patch">
	<metadata>
		<title>security update for shadow-utils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4641" ref_url="https://www.suse.com/security/cve/CVE-2023-4641/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6632.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6632.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4641/">CVE-2023-4641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4641">CVE-2023-4641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811167" comment="shadow-utils-4.9-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811168" comment="shadow-utils-subid-4.9-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811169" comment="shadow-utils-subid-devel-4.9-8.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4009" version="1" class="patch">
	<metadata>
		<title>security update for c-ares (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-4904" ref_url="https://www.suse.com/security/cve/CVE-2022-4904/" source="CVE"/>
		<reference ref_id="CVE-2023-31124" ref_url="https://www.suse.com/security/cve/CVE-2023-31124/" source="CVE"/>
		<reference ref_id="CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130/" source="CVE"/>
		<reference ref_id="CVE-2023-31147" ref_url="https://www.suse.com/security/cve/CVE-2023-31147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6635.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6635.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-4904/">CVE-2022-4904 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-31124/">CVE-2023-31124 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31147/">CVE-2023-31147 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811170" comment="c-ares-1.19.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811171" comment="c-ares-devel-1.19.1-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4010" version="1" class="patch">
	<metadata>
		<title>security update for libssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-1667" ref_url="https://www.suse.com/security/cve/CVE-2023-1667/" source="CVE"/>
		<reference ref_id="CVE-2023-2283" ref_url="https://www.suse.com/security/cve/CVE-2023-2283/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6643.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6643.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1667/">CVE-2023-1667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1667">CVE-2023-1667 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-2283/">CVE-2023-2283 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2283">CVE-2023-2283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810807" comment="libssh-0.10.4-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810808" comment="libssh-config-0.10.4-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810809" comment="libssh-devel-0.10.4-11.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4011" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6659.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6659.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810810" comment="python-unversioned-command-3.9.18-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810811" comment="python3-3.9.18-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810812" comment="python3-debug-3.9.18-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810813" comment="python3-devel-3.9.18-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810814" comment="python3-idle-3.9.18-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810815" comment="python3-libs-3.9.18-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810816" comment="python3-test-3.9.18-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810817" comment="python3-tkinter-3.9.18-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4012" version="1" class="patch">
	<metadata>
		<title>security update for gmp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6661.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6661.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">CVE-2021-43618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811172" comment="gmp-6.2.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811173" comment="gmp-c++-6.2.0-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811174" comment="gmp-devel-6.2.0-13.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4013" version="1" class="patch">
	<metadata>
		<title>security update for evolution-mapi (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-2127" ref_url="https://www.suse.com/security/cve/CVE-2022-2127/" source="CVE"/>
		<reference ref_id="CVE-2023-34966" ref_url="https://www.suse.com/security/cve/CVE-2023-34966/" source="CVE"/>
		<reference ref_id="CVE-2023-34967" ref_url="https://www.suse.com/security/cve/CVE-2023-34967/" source="CVE"/>
		<reference ref_id="CVE-2023-34968" ref_url="https://www.suse.com/security/cve/CVE-2023-34968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6667.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6667.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2127/">CVE-2022-2127 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2127">CVE-2022-2127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34966/">CVE-2023-34966 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34966">CVE-2023-34966 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34967/">CVE-2023-34967 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34967">CVE-2023-34967 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34968/">CVE-2023-34968 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34968">CVE-2023-34968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813379" comment="ctdb-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813302" comment="evolution-mapi-3.40.1-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813303" comment="evolution-mapi-langpacks-3.40.1-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813304" comment="libnetapi-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813380" comment="libnetapi-devel-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813305" comment="libsmbclient-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813381" comment="libsmbclient-devel-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813306" comment="libwbclient-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813382" comment="libwbclient-devel-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813307" comment="openchange-2.3-41.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813308" comment="python3-samba-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813309" comment="python3-samba-dc-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813383" comment="python3-samba-devel-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813384" comment="python3-samba-test-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813310" comment="samba-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813311" comment="samba-client-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813312" comment="samba-client-libs-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813313" comment="samba-common-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813314" comment="samba-common-libs-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813315" comment="samba-common-tools-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813316" comment="samba-dc-libs-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813317" comment="samba-dcerpc-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813385" comment="samba-devel-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813318" comment="samba-krb5-printing-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813319" comment="samba-ldb-ldap-modules-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813320" comment="samba-libs-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813386" comment="samba-pidl-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813387" comment="samba-test-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813388" comment="samba-test-libs-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813321" comment="samba-tools-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813322" comment="samba-usershares-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813323" comment="samba-vfs-iouring-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813324" comment="samba-winbind-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813325" comment="samba-winbind-clients-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813326" comment="samba-winbind-krb5-locator-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813327" comment="samba-winbind-modules-4.18.6-100.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813328" comment="samba-winexe-4.18.6-100.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4014" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-27533" ref_url="https://www.suse.com/security/cve/CVE-2023-27533/" source="CVE"/>
		<reference ref_id="CVE-2023-27534" ref_url="https://www.suse.com/security/cve/CVE-2023-27534/" source="CVE"/>
		<reference ref_id="CVE-2023-27536" ref_url="https://www.suse.com/security/cve/CVE-2023-27536/" source="CVE"/>
		<reference ref_id="CVE-2023-27538" ref_url="https://www.suse.com/security/cve/CVE-2023-27538/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6679.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6679.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27533/">CVE-2023-27533 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27533">CVE-2023-27533 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27534/">CVE-2023-27534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27534">CVE-2023-27534 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27536/">CVE-2023-27536 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27536">CVE-2023-27536 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27538/">CVE-2023-27538 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27538">CVE-2023-27538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811175" comment="curl-7.76.1-26.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811176" comment="curl-minimal-7.76.1-26.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811177" comment="libcurl-7.76.1-26.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811178" comment="libcurl-devel-7.76.1-26.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811179" comment="libcurl-minimal-7.76.1-26.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4015" version="1" class="patch">
	<metadata>
		<title>security update for tpm2-tss (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-22745" ref_url="https://www.suse.com/security/cve/CVE-2023-22745/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6685.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6685.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22745/">CVE-2023-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22745">CVE-2023-22745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810818" comment="tpm2-tss-3.2.2-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810819" comment="tpm2-tss-devel-3.2.2-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4016" version="1" class="patch">
	<metadata>
		<title>security update for python-pip (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6694.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6694.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811180" comment="python3-pip-21.2.3-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811181" comment="python3-pip-wheel-21.2.3-7.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4017" version="1" class="patch">
	<metadata>
		<title>security update for ncurses (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-29491" ref_url="https://www.suse.com/security/cve/CVE-2023-29491/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6698.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6698.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-29491/">CVE-2023-29491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29491">CVE-2023-29491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810820" comment="ncurses-6.2-10.20210508.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810821" comment="ncurses-base-6.2-10.20210508.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810822" comment="ncurses-c++-libs-6.2-10.20210508.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810823" comment="ncurses-devel-6.2-10.20210508.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810824" comment="ncurses-libs-6.2-10.20210508.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810825" comment="ncurses-term-6.2-10.20210508.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4018" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-36054" ref_url="https://www.suse.com/security/cve/CVE-2023-36054/" source="CVE"/>
		<reference ref_id="CVE-2023-39975" ref_url="https://www.suse.com/security/cve/CVE-2023-39975/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6699.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6699.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36054/">CVE-2023-36054 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36054">CVE-2023-36054 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39975/">CVE-2023-39975 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39975">CVE-2023-39975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810826" comment="krb5-devel-1.21.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810827" comment="krb5-libs-1.21.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810828" comment="krb5-pkinit-1.21.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810829" comment="krb5-server-1.21.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810830" comment="krb5-server-ldap-1.21.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810831" comment="krb5-workstation-1.21.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810832" comment="libkadm5-1.21.1-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4019" version="1" class="patch">
	<metadata>
		<title>security update for procps-ng (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4016" ref_url="https://www.suse.com/security/cve/CVE-2023-4016/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6705.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6705.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4016/">CVE-2023-4016 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811182" comment="procps-ng-3.3.17-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811183" comment="procps-ng-devel-3.3.17-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811184" comment="procps-ng-i18n-3.3.17-13.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4020" version="1" class="patch">
	<metadata>
		<title>security update for avahi (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="CVE-2021-3502" ref_url="https://www.suse.com/security/cve/CVE-2021-3502/" source="CVE"/>
		<reference ref_id="CVE-2023-1981" ref_url="https://www.suse.com/security/cve/CVE-2023-1981/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6707.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6707.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3502/">CVE-2021-3502 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3502">CVE-2021-3502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1981/">CVE-2023-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1981">CVE-2023-1981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811185" comment="avahi-0.8-15.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811186" comment="avahi-compat-howl-0.8-15.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811187" comment="avahi-compat-howl-devel-0.8-15.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811188" comment="avahi-compat-libdns_sd-0.8-15.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811189" comment="avahi-compat-libdns_sd-devel-0.8-15.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811190" comment="avahi-devel-0.8-15.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811191" comment="avahi-glib-0.8-15.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811192" comment="avahi-glib-devel-0.8-15.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811193" comment="avahi-libs-0.8-15.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811194" comment="avahi-tools-0.8-15.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4021" version="1" class="patch">
	<metadata>
		<title>security update for python-wheel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-40898" ref_url="https://www.suse.com/security/cve/CVE-2022-40898/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6712.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6712.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40898/">CVE-2022-40898 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40898">CVE-2022-40898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810833" comment="python3-wheel-0.36.2-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810834" comment="python3-wheel-wheel-0.36.2-8.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4022" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-43115" ref_url="https://www.suse.com/security/cve/CVE-2023-43115/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6732.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6732.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-43115/">CVE-2023-43115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43115">CVE-2023-43115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811195" comment="ghostscript-9.54.0-14.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811196" comment="ghostscript-doc-9.54.0-14.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811197" comment="ghostscript-tools-dvipdf-9.54.0-14.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811198" comment="ghostscript-tools-fonts-9.54.0-14.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811199" comment="ghostscript-tools-printing-9.54.0-14.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811200" comment="ghostscript-x11-9.54.0-14.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811201" comment="libgs-9.54.0-14.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811202" comment="libgs-devel-9.54.0-14.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4023" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-22025" ref_url="https://www.suse.com/security/cve/CVE-2023-22025/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6738.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6738.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22025/">CVE-2023-22025 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22025">CVE-2023-22025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813734" comment="java-21-openjdk-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813735" comment="java-21-openjdk-demo-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813736" comment="java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813737" comment="java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813738" comment="java-21-openjdk-devel-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813739" comment="java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813740" comment="java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813741" comment="java-21-openjdk-fastdebug-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813742" comment="java-21-openjdk-headless-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813743" comment="java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813744" comment="java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813745" comment="java-21-openjdk-javadoc-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813746" comment="java-21-openjdk-javadoc-zip-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813747" comment="java-21-openjdk-jmods-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813748" comment="java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813749" comment="java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813750" comment="java-21-openjdk-slowdebug-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813751" comment="java-21-openjdk-src-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813752" comment="java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813753" comment="java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813754" comment="java-21-openjdk-static-libs-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813755" comment="java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813756" comment="java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4024" version="1" class="patch">
	<metadata>
		<title>security update for samba (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-3961" ref_url="https://www.suse.com/security/cve/CVE-2023-3961/" source="CVE"/>
		<reference ref_id="CVE-2023-4091" ref_url="https://www.suse.com/security/cve/CVE-2023-4091/" source="CVE"/>
		<reference ref_id="CVE-2023-42669" ref_url="https://www.suse.com/security/cve/CVE-2023-42669/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6744.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6744.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-3961/">CVE-2023-3961 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3961">CVE-2023-3961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4091/">CVE-2023-4091 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42669/">CVE-2023-42669 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42669">CVE-2023-42669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811203" comment="ctdb-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811204" comment="libnetapi-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811205" comment="libnetapi-devel-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811206" comment="libsmbclient-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811207" comment="libsmbclient-devel-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811208" comment="libwbclient-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811209" comment="libwbclient-devel-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811210" comment="python3-samba-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811211" comment="python3-samba-dc-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811212" comment="python3-samba-devel-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811213" comment="python3-samba-test-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811214" comment="samba-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811215" comment="samba-client-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811216" comment="samba-client-libs-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811217" comment="samba-common-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811218" comment="samba-common-libs-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811219" comment="samba-common-tools-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811220" comment="samba-dc-libs-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811221" comment="samba-dcerpc-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811222" comment="samba-devel-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811223" comment="samba-krb5-printing-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811224" comment="samba-ldb-ldap-modules-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811225" comment="samba-libs-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811226" comment="samba-pidl-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811227" comment="samba-test-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811228" comment="samba-test-libs-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811229" comment="samba-tools-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811230" comment="samba-usershares-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811231" comment="samba-vfs-iouring-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811232" comment="samba-winbind-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811233" comment="samba-winbind-clients-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811234" comment="samba-winbind-krb5-locator-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811235" comment="samba-winbind-modules-4.18.6-101.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811236" comment="samba-winexe-4.18.6-101.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4025" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-38545" ref_url="https://www.suse.com/security/cve/CVE-2023-38545/" source="CVE"/>
		<reference ref_id="CVE-2023-38546" ref_url="https://www.suse.com/security/cve/CVE-2023-38546/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6745.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6745.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38545/">CVE-2023-38545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-38546/">CVE-2023-38546 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811237" comment="curl-7.76.1-26.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811238" comment="curl-minimal-7.76.1-26.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811239" comment="libcurl-7.76.1-26.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811240" comment="libcurl-devel-7.76.1-26.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811241" comment="libcurl-minimal-7.76.1-26.el9_3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4026" version="1" class="patch">
	<metadata>
		<title>security update for nghttp2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6746.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6746.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811242" comment="libnghttp2-1.43.0-5.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811243" comment="libnghttp2-devel-1.43.0-5.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811244" comment="nghttp2-1.43.0-5.el9_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4027" version="1" class="patch">
	<metadata>
		<title>security update for squid (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-46846" ref_url="https://www.suse.com/security/cve/CVE-2023-46846/" source="CVE"/>
		<reference ref_id="CVE-2023-46847" ref_url="https://www.suse.com/security/cve/CVE-2023-46847/" source="CVE"/>
		<reference ref_id="CVE-2023-46848" ref_url="https://www.suse.com/security/cve/CVE-2023-46848/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6748.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6748.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46846/">CVE-2023-46846 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46846">CVE-2023-46846 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46847/">CVE-2023-46847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46847">CVE-2023-46847 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46848/">CVE-2023-46848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46848">CVE-2023-46848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811245" comment="squid-5.5-6.el9_3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4028" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-36049" ref_url="https://www.suse.com/security/cve/CVE-2023-36049/" source="CVE"/>
		<reference ref_id="CVE-2023-36558" ref_url="https://www.suse.com/security/cve/CVE-2023-36558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7253.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7253.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36049/">CVE-2023-36049 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36049">CVE-2023-36049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36558/">CVE-2023-36558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36558">CVE-2023-36558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009814533" comment="aspnetcore-runtime-8.0-8.0.0-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814534" comment="aspnetcore-targeting-pack-8.0-8.0.0-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814535" comment="dotnet-apphost-pack-8.0-8.0.0-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814536" comment="dotnet-host-8.0.0-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814537" comment="dotnet-hostfxr-8.0-8.0.0-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814538" comment="dotnet-runtime-8.0-8.0.0-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814539" comment="dotnet-sdk-8.0-8.0.100-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814540" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814541" comment="dotnet-targeting-pack-8.0-8.0.0-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814542" comment="dotnet-templates-8.0-8.0.100-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814543" comment="netstandard-targeting-pack-2.1-8.0.100-2.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4029" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-36049" ref_url="https://www.suse.com/security/cve/CVE-2023-36049/" source="CVE"/>
		<reference ref_id="CVE-2023-36558" ref_url="https://www.suse.com/security/cve/CVE-2023-36558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7255.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7255.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36049/">CVE-2023-36049 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36049">CVE-2023-36049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36558/">CVE-2023-36558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36558">CVE-2023-36558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811269" comment="aspnetcore-runtime-7.0-7.0.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811270" comment="aspnetcore-targeting-pack-7.0-7.0.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811271" comment="dotnet-apphost-pack-7.0-7.0.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811272" comment="dotnet-hostfxr-7.0-7.0.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811273" comment="dotnet-runtime-7.0-7.0.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811274" comment="dotnet-sdk-7.0-7.0.114-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811275" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811276" comment="dotnet-targeting-pack-7.0-7.0.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811277" comment="dotnet-templates-7.0-7.0.114-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4030" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-36049" ref_url="https://www.suse.com/security/cve/CVE-2023-36049/" source="CVE"/>
		<reference ref_id="CVE-2023-36558" ref_url="https://www.suse.com/security/cve/CVE-2023-36558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7257.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7257.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36049/">CVE-2023-36049 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36049">CVE-2023-36049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36558/">CVE-2023-36558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36558">CVE-2023-36558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811278" comment="aspnetcore-runtime-6.0-6.0.25-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811279" comment="aspnetcore-targeting-pack-6.0-6.0.25-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811280" comment="dotnet-apphost-pack-6.0-6.0.25-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811281" comment="dotnet-hostfxr-6.0-6.0.25-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811282" comment="dotnet-runtime-6.0-6.0.25-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811283" comment="dotnet-sdk-6.0-6.0.125-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811284" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811285" comment="dotnet-targeting-pack-6.0-6.0.25-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811286" comment="dotnet-templates-6.0-6.0.125-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4031" version="1" class="patch">
	<metadata>
		<title>security update for open-vm-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-34058" ref_url="https://www.suse.com/security/cve/CVE-2023-34058/" source="CVE"/>
		<reference ref_id="CVE-2023-34059" ref_url="https://www.suse.com/security/cve/CVE-2023-34059/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7277.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7277.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34058/">CVE-2023-34058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34059/">CVE-2023-34059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811287" comment="open-vm-tools-12.2.5-3.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811288" comment="open-vm-tools-desktop-12.2.5-3.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811289" comment="open-vm-tools-salt-minion-12.2.5-3.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811290" comment="open-vm-tools-sdmp-12.2.5-3.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811291" comment="open-vm-tools-test-12.2.5-3.el9_3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4032" version="1" class="patch">
	<metadata>
		<title>security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-49288" ref_url="https://www.suse.com/security/cve/CVE-2023-49288/" source="CVE"/>
		<reference ref_id="CVE-2023-5824" ref_url="https://www.suse.com/security/cve/CVE-2023-5824/" source="CVE"/>
		<reference ref_id="CVE-2025-54574" ref_url="https://www.suse.com/security/cve/CVE-2025-54574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7465.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7465.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49288/">CVE-2023-49288 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49288">CVE-2023-49288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5824/">CVE-2023-5824 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5824">CVE-2023-5824 at NVD</cve>
	<cve impact="high" cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:H/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54574/">CVE-2025-54574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54574">CVE-2025-54574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813389" comment="squid-5.5-6.el9_3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4033" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204/" source="CVE"/>
		<reference ref_id="CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205/" source="CVE"/>
		<reference ref_id="CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206/" source="CVE"/>
		<reference ref_id="CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207/" source="CVE"/>
		<reference ref_id="CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208/" source="CVE"/>
		<reference ref_id="CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209/" source="CVE"/>
		<reference ref_id="CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7501.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7501.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814342" comment="thunderbird-115.5.0-1.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4034" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204/" source="CVE"/>
		<reference ref_id="CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205/" source="CVE"/>
		<reference ref_id="CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206/" source="CVE"/>
		<reference ref_id="CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207/" source="CVE"/>
		<reference ref_id="CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208/" source="CVE"/>
		<reference ref_id="CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209/" source="CVE"/>
		<reference ref_id="CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7507.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7507.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009814544" comment="firefox-115.5.0-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814545" comment="firefox-x11-115.5.0-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4035" version="1" class="patch">
	<metadata>
		<title>security update for apr (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-24963" ref_url="https://www.suse.com/security/cve/CVE-2022-24963/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7711.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7711.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24963/">CVE-2022-24963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24963">CVE-2022-24963 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816706" comment="apr-1.7.0-12.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816707" comment="apr-devel-1.7.0-12.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4036" version="1" class="patch">
	<metadata>
		<title>security update for tracker-miners (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5557" ref_url="https://www.suse.com/security/cve/CVE-2023-5557/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7712.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7712.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-5557/">CVE-2023-5557 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5557">CVE-2023-5557 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816418" comment="tracker-miners-3.1.2-4.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4037" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-42917" ref_url="https://www.suse.com/security/cve/CVE-2023-42917/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7715.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7715.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42917/">CVE-2023-42917 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42917">CVE-2023-42917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816419" comment="webkit2gtk3-2.40.5-1.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816420" comment="webkit2gtk3-devel-2.40.5-1.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816421" comment="webkit2gtk3-jsc-2.40.5-1.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816422" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4038" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-39615" ref_url="https://www.suse.com/security/cve/CVE-2023-39615/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7747.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7747.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39615/">CVE-2023-39615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39615">CVE-2023-39615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816708" comment="libxml2-2.9.13-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816709" comment="libxml2-devel-2.9.13-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816710" comment="python3-libxml2-2.9.13-5.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4039" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871/" source="CVE"/>
		<reference ref_id="CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345/" source="CVE"/>
		<reference ref_id="CVE-2023-53657" ref_url="https://www.suse.com/security/cve/CVE-2023-53657/" source="CVE"/>
		<reference ref_id="CVE-2023-53996" ref_url="https://www.suse.com/security/cve/CVE-2023-53996/" source="CVE"/>
		<reference ref_id="CVE-2023-54170" ref_url="https://www.suse.com/security/cve/CVE-2023-54170/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7749.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7749.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53657/">CVE-2023-53657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53657">CVE-2023-53657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53996/">CVE-2023-53996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53996">CVE-2023-53996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54170/">CVE-2023-54170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54170">CVE-2023-54170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816058" comment="bpftool-7.2.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816059" comment="kernel-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816060" comment="kernel-abi-stablelists-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816061" comment="kernel-core-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816062" comment="kernel-cross-headers-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816063" comment="kernel-debug-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816064" comment="kernel-debug-core-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816067" comment="kernel-debug-modules-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816068" comment="kernel-debug-modules-core-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816069" comment="kernel-debug-modules-extra-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816070" comment="kernel-debug-uki-virt-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816073" comment="kernel-doc-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816074" comment="kernel-headers-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816075" comment="kernel-modules-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816076" comment="kernel-modules-core-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816077" comment="kernel-modules-extra-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816078" comment="kernel-tools-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816079" comment="kernel-tools-libs-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816081" comment="kernel-uki-virt-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816082" comment="libperf-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816083" comment="perf-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816084" comment="python3-perf-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816085" comment="rtla-5.14.0-362.13.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816086" comment="rv-5.14.0-362.13.1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4040" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-37920" ref_url="https://www.suse.com/security/cve/CVE-2023-37920/" source="CVE"/>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7753.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7753.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-37920/">CVE-2023-37920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846265" comment="fence-agents-aliyun-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846266" comment="fence-agents-all-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846267" comment="fence-agents-amt-ws-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846268" comment="fence-agents-apc-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846269" comment="fence-agents-apc-snmp-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846270" comment="fence-agents-aws-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846271" comment="fence-agents-azure-arm-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846272" comment="fence-agents-bladecenter-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846273" comment="fence-agents-brocade-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846274" comment="fence-agents-cisco-mds-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846275" comment="fence-agents-cisco-ucs-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846276" comment="fence-agents-common-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846277" comment="fence-agents-compute-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846278" comment="fence-agents-drac5-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846279" comment="fence-agents-eaton-snmp-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846280" comment="fence-agents-emerson-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846281" comment="fence-agents-eps-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846282" comment="fence-agents-gce-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846283" comment="fence-agents-heuristics-ping-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846284" comment="fence-agents-hpblade-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846285" comment="fence-agents-ibm-powervs-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846286" comment="fence-agents-ibm-vpc-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846287" comment="fence-agents-ibmblade-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846288" comment="fence-agents-ifmib-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846289" comment="fence-agents-ilo-moonshot-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846290" comment="fence-agents-ilo-mp-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846291" comment="fence-agents-ilo-ssh-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846292" comment="fence-agents-ilo2-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846293" comment="fence-agents-intelmodular-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846294" comment="fence-agents-ipdu-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846295" comment="fence-agents-ipmilan-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846296" comment="fence-agents-kdump-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846297" comment="fence-agents-kubevirt-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846298" comment="fence-agents-mpath-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846299" comment="fence-agents-openstack-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846300" comment="fence-agents-redfish-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846301" comment="fence-agents-rhevm-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846302" comment="fence-agents-rsa-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846303" comment="fence-agents-rsb-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846304" comment="fence-agents-sbd-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846305" comment="fence-agents-scsi-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846306" comment="fence-agents-virsh-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846307" comment="fence-agents-vmware-rest-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846308" comment="fence-agents-vmware-soap-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846309" comment="fence-agents-wti-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846310" comment="fence-virt-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846311" comment="fence-virtd-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846312" comment="fence-virtd-cpg-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846313" comment="fence-virtd-libvirt-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846314" comment="fence-virtd-multicast-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846315" comment="fence-virtd-serial-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846316" comment="fence-virtd-tcp-4.10.0-55.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846317" comment="ha-cloud-support-4.10.0-55.el9_3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4041" version="1" class="patch">
	<metadata>
		<title>security update for pixman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-44638" ref_url="https://www.suse.com/security/cve/CVE-2022-44638/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7754.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7754.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44638/">CVE-2022-44638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44638">CVE-2022-44638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816423" comment="pixman-0.40.0-6.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816424" comment="pixman-devel-0.40.0-6.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4042" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318/" source="CVE"/>
		<reference ref_id="CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319/" source="CVE"/>
		<reference ref_id="CVE-2023-39321" ref_url="https://www.suse.com/security/cve/CVE-2023-39321/" source="CVE"/>
		<reference ref_id="CVE-2023-39322" ref_url="https://www.suse.com/security/cve/CVE-2023-39322/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7762.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7762.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39321/">CVE-2023-39321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39322/">CVE-2023-39322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816425" comment="skopeo-1.13.3-3.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816426" comment="skopeo-tests-1.13.3-3.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4043" version="1" class="patch">
	<metadata>
		<title>security update for runc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="CVE-2023-39321" ref_url="https://www.suse.com/security/cve/CVE-2023-39321/" source="CVE"/>
		<reference ref_id="CVE-2023-39322" ref_url="https://www.suse.com/security/cve/CVE-2023-39322/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7763.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7763.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39321/">CVE-2023-39321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39322/">CVE-2023-39322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816427" comment="runc-1.1.9-2.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4044" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318/" source="CVE"/>
		<reference ref_id="CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319/" source="CVE"/>
		<reference ref_id="CVE-2023-39321" ref_url="https://www.suse.com/security/cve/CVE-2023-39321/" source="CVE"/>
		<reference ref_id="CVE-2023-39322" ref_url="https://www.suse.com/security/cve/CVE-2023-39322/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7764.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7764.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39321/">CVE-2023-39321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39322/">CVE-2023-39322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816428" comment="buildah-1.31.3-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816429" comment="buildah-tests-1.31.3-2.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4045" version="1" class="patch">
	<metadata>
		<title>security update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318/" source="CVE"/>
		<reference ref_id="CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319/" source="CVE"/>
		<reference ref_id="CVE-2023-39321" ref_url="https://www.suse.com/security/cve/CVE-2023-39321/" source="CVE"/>
		<reference ref_id="CVE-2023-39322" ref_url="https://www.suse.com/security/cve/CVE-2023-39322/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7765.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7765.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39321/">CVE-2023-39321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39322/">CVE-2023-39322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816430" comment="podman-4.6.1-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816431" comment="podman-docker-4.6.1-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816432" comment="podman-gvproxy-4.6.1-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816433" comment="podman-plugins-4.6.1-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816434" comment="podman-remote-4.6.1-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816435" comment="podman-tests-4.6.1-7.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4046" version="1" class="patch">
	<metadata>
		<title>security update for containernetworking-plugins (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318/" source="CVE"/>
		<reference ref_id="CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319/" source="CVE"/>
		<reference ref_id="CVE-2023-39321" ref_url="https://www.suse.com/security/cve/CVE-2023-39321/" source="CVE"/>
		<reference ref_id="CVE-2023-39322" ref_url="https://www.suse.com/security/cve/CVE-2023-39322/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7766.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7766.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39321/">CVE-2023-39321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39322/">CVE-2023-39322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816436" comment="containernetworking-plugins-1.3.0-6.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4047" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7784.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7784.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816711" comment="postgresql-13.13-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816712" comment="postgresql-contrib-13.13-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816713" comment="postgresql-docs-13.13-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816714" comment="postgresql-plperl-13.13-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816715" comment="postgresql-plpython3-13.13-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816716" comment="postgresql-pltcl-13.13-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816717" comment="postgresql-private-devel-13.13-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816718" comment="postgresql-private-libs-13.13-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816719" comment="postgresql-server-13.13-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816720" comment="postgresql-server-devel-13.13-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816721" comment="postgresql-static-13.13-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816722" comment="postgresql-test-13.13-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816723" comment="postgresql-upgrade-13.13-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816724" comment="postgresql-upgrade-devel-13.13-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4048" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<reference ref_id="CVE-2023-39418" ref_url="https://www.suse.com/security/cve/CVE-2023-39418/" source="CVE"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7785.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7785.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39418/">CVE-2023-39418 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39418">CVE-2023-39418 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806688" comment="pg_repack-1.4.8-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816725" comment="postgresql-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816726" comment="postgresql-contrib-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816727" comment="postgresql-docs-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816728" comment="postgresql-plperl-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816729" comment="postgresql-plpython3-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816730" comment="postgresql-pltcl-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816731" comment="postgresql-private-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816732" comment="postgresql-private-libs-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816733" comment="postgresql-server-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816734" comment="postgresql-server-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816735" comment="postgresql-static-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816736" comment="postgresql-test-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816737" comment="postgresql-test-rpm-macros-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816738" comment="postgresql-upgrade-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816739" comment="postgresql-upgrade-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4049" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-bad-free (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44429" ref_url="https://www.suse.com/security/cve/CVE-2023-44429/" source="CVE"/>
		<reference ref_id="CVE-2023-44446" ref_url="https://www.suse.com/security/cve/CVE-2023-44446/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7791.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7791.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44429/">CVE-2023-44429 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44429">CVE-2023-44429 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44446/">CVE-2023-44446 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44446">CVE-2023-44446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816825" comment="gstreamer1-plugins-bad-free-1.22.1-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816826" comment="gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4050" version="1" class="patch">
	<metadata>
		<title>security update for opensc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-40660" ref_url="https://www.suse.com/security/cve/CVE-2023-40660/" source="CVE"/>
		<reference ref_id="CVE-2023-40661" ref_url="https://www.suse.com/security/cve/CVE-2023-40661/" source="CVE"/>
		<reference ref_id="CVE-2023-4535" ref_url="https://www.suse.com/security/cve/CVE-2023-4535/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7879.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7879.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40660/">CVE-2023-40660 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40660">CVE-2023-40660 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-40661/">CVE-2023-40661 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40661">CVE-2023-40661 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4535/">CVE-2023-4535 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4535">CVE-2023-4535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818054" comment="opensc-0.23.0-3.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4051" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-50761" ref_url="https://www.suse.com/security/cve/CVE-2023-50761/" source="CVE"/>
		<reference ref_id="CVE-2023-50762" ref_url="https://www.suse.com/security/cve/CVE-2023-50762/" source="CVE"/>
		<reference ref_id="CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856/" source="CVE"/>
		<reference ref_id="CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857/" source="CVE"/>
		<reference ref_id="CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858/" source="CVE"/>
		<reference ref_id="CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859/" source="CVE"/>
		<reference ref_id="CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860/" source="CVE"/>
		<reference ref_id="CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861/" source="CVE"/>
		<reference ref_id="CVE-2023-6862" ref_url="https://www.suse.com/security/cve/CVE-2023-6862/" source="CVE"/>
		<reference ref_id="CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863/" source="CVE"/>
		<reference ref_id="CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0001.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0001.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50761/">CVE-2023-50761 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50761">CVE-2023-50761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50762/">CVE-2023-50762 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50762">CVE-2023-50762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6862/">CVE-2023-6862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6862">CVE-2023-6862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818847" comment="thunderbird-115.6.0-1.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4052" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367/" source="CVE"/>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0010.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0010.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818848" comment="tigervnc-1.13.1-3.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818849" comment="tigervnc-icons-1.13.1-3.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818850" comment="tigervnc-license-1.13.1-3.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818851" comment="tigervnc-selinux-1.13.1-3.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818852" comment="tigervnc-server-1.13.1-3.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818853" comment="tigervnc-server-minimal-1.13.1-3.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818854" comment="tigervnc-server-module-1.13.1-3.el9_3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4053" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856/" source="CVE"/>
		<reference ref_id="CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857/" source="CVE"/>
		<reference ref_id="CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858/" source="CVE"/>
		<reference ref_id="CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859/" source="CVE"/>
		<reference ref_id="CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860/" source="CVE"/>
		<reference ref_id="CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861/" source="CVE"/>
		<reference ref_id="CVE-2023-6862" ref_url="https://www.suse.com/security/cve/CVE-2023-6862/" source="CVE"/>
		<reference ref_id="CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863/" source="CVE"/>
		<reference ref_id="CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864/" source="CVE"/>
		<reference ref_id="CVE-2023-6865" ref_url="https://www.suse.com/security/cve/CVE-2023-6865/" source="CVE"/>
		<reference ref_id="CVE-2023-6867" ref_url="https://www.suse.com/security/cve/CVE-2023-6867/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0025.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0025.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6862/">CVE-2023-6862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6862">CVE-2023-6862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6865/">CVE-2023-6865 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6865">CVE-2023-6865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6867/">CVE-2023-6867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6867">CVE-2023-6867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818855" comment="firefox-115.6.0-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818856" comment="firefox-x11-115.6.0-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4054" version="1" class="patch">
	<metadata>
		<title>security update for squid (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-46724" ref_url="https://www.suse.com/security/cve/CVE-2023-46724/" source="CVE"/>
		<reference ref_id="CVE-2023-46728" ref_url="https://www.suse.com/security/cve/CVE-2023-46728/" source="CVE"/>
		<reference ref_id="CVE-2023-49285" ref_url="https://www.suse.com/security/cve/CVE-2023-49285/" source="CVE"/>
		<reference ref_id="CVE-2023-49286" ref_url="https://www.suse.com/security/cve/CVE-2023-49286/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0071.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0071.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46724/">CVE-2023-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46724">CVE-2023-46724 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46728/">CVE-2023-46728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46728">CVE-2023-46728 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49285/">CVE-2023-49285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49285">CVE-2023-49285 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49286/">CVE-2023-49286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49286">CVE-2023-49286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819046" comment="squid-5.5-6.el9_3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4055" version="1" class="patch">
	<metadata>
		<title>security update for nss (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0108.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0108.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844491" comment="nspr-4.35.0-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844492" comment="nspr-devel-4.35.0-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844493" comment="nss-3.90.0-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844494" comment="nss-devel-3.90.0-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844495" comment="nss-softokn-3.90.0-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844496" comment="nss-softokn-devel-3.90.0-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844497" comment="nss-softokn-freebl-3.90.0-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844498" comment="nss-softokn-freebl-devel-3.90.0-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844499" comment="nss-sysinit-3.90.0-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844500" comment="nss-tools-3.90.0-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844501" comment="nss-util-3.90.0-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844502" comment="nss-util-devel-3.90.0-4.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4056" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5455" ref_url="https://www.suse.com/security/cve/CVE-2023-5455/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0141.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0141.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5455/">CVE-2023-5455 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5455">CVE-2023-5455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819534" comment="ipa-client-4.10.2-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819535" comment="ipa-client-common-4.10.2-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819536" comment="ipa-client-epn-4.10.2-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819537" comment="ipa-client-samba-4.10.2-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819538" comment="ipa-common-4.10.2-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819539" comment="ipa-selinux-4.10.2-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819540" comment="ipa-server-4.10.2-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819541" comment="ipa-server-common-4.10.2-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819542" comment="ipa-server-dns-4.10.2-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819543" comment="ipa-server-trust-ad-4.10.2-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819544" comment="python3-ipaclient-4.10.2-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819545" comment="python3-ipalib-4.10.2-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819546" comment="python3-ipaserver-4.10.2-5.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819547" comment="python3-ipatests-4.10.2-5.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4057" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-46233" ref_url="https://www.suse.com/security/cve/CVE-2023-46233/" source="CVE"/>
		<reference ref_id="CVE-2024-0056" ref_url="https://www.suse.com/security/cve/CVE-2024-0056/" source="CVE"/>
		<reference ref_id="CVE-2024-0057" ref_url="https://www.suse.com/security/cve/CVE-2024-0057/" source="CVE"/>
		<reference ref_id="CVE-2024-21319" ref_url="https://www.suse.com/security/cve/CVE-2024-21319/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0151.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0151.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46233/">CVE-2023-46233 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46233">CVE-2023-46233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0056/">CVE-2024-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0056">CVE-2024-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0057/">CVE-2024-0057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0057">CVE-2024-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21319/">CVE-2024-21319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21319">CVE-2024-21319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872189" comment="aspnetcore-runtime-7.0-7.0.15-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872190" comment="aspnetcore-targeting-pack-7.0-7.0.15-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872191" comment="dotnet-apphost-pack-7.0-7.0.15-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872192" comment="dotnet-hostfxr-7.0-7.0.15-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872193" comment="dotnet-runtime-7.0-7.0.15-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872194" comment="dotnet-sdk-7.0-7.0.115-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872195" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872196" comment="dotnet-targeting-pack-7.0-7.0.15-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872197" comment="dotnet-templates-7.0-7.0.115-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4058" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-0056" ref_url="https://www.suse.com/security/cve/CVE-2024-0056/" source="CVE"/>
		<reference ref_id="CVE-2024-0057" ref_url="https://www.suse.com/security/cve/CVE-2024-0057/" source="CVE"/>
		<reference ref_id="CVE-2024-21319" ref_url="https://www.suse.com/security/cve/CVE-2024-21319/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0152.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0152.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0056/">CVE-2024-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0056">CVE-2024-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0057/">CVE-2024-0057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0057">CVE-2024-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21319/">CVE-2024-21319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21319">CVE-2024-21319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819548" comment="aspnetcore-runtime-8.0-8.0.1-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819549" comment="aspnetcore-targeting-pack-8.0-8.0.1-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819550" comment="dotnet-apphost-pack-8.0-8.0.1-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819551" comment="dotnet-host-8.0.1-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819552" comment="dotnet-hostfxr-8.0-8.0.1-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819553" comment="dotnet-runtime-8.0-8.0.1-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819554" comment="dotnet-sdk-8.0-8.0.101-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819555" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819556" comment="dotnet-targeting-pack-8.0-8.0.1-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819557" comment="dotnet-templates-8.0-8.0.101-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819558" comment="netstandard-targeting-pack-2.1-8.0.101-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4059" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-46233" ref_url="https://www.suse.com/security/cve/CVE-2023-46233/" source="CVE"/>
		<reference ref_id="CVE-2024-0056" ref_url="https://www.suse.com/security/cve/CVE-2024-0056/" source="CVE"/>
		<reference ref_id="CVE-2024-0057" ref_url="https://www.suse.com/security/cve/CVE-2024-0057/" source="CVE"/>
		<reference ref_id="CVE-2024-21319" ref_url="https://www.suse.com/security/cve/CVE-2024-21319/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0156.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0156.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46233/">CVE-2023-46233 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46233">CVE-2023-46233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0056/">CVE-2024-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0056">CVE-2024-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0057/">CVE-2024-0057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0057">CVE-2024-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21319/">CVE-2024-21319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21319">CVE-2024-21319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819673" comment="aspnetcore-runtime-6.0-6.0.26-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819674" comment="aspnetcore-targeting-pack-6.0-6.0.26-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819675" comment="dotnet-apphost-pack-6.0-6.0.26-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819676" comment="dotnet-hostfxr-6.0-6.0.26-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819677" comment="dotnet-runtime-6.0-6.0.26-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819678" comment="dotnet-sdk-6.0-6.0.126-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819679" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819680" comment="dotnet-targeting-pack-6.0-6.0.26-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819681" comment="dotnet-templates-6.0-6.0.126-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4060" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0249.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0249.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819996" comment="java-21-openjdk-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819997" comment="java-21-openjdk-demo-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819998" comment="java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819999" comment="java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820000" comment="java-21-openjdk-devel-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820001" comment="java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820002" comment="java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820003" comment="java-21-openjdk-fastdebug-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820004" comment="java-21-openjdk-headless-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820005" comment="java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820006" comment="java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820007" comment="java-21-openjdk-javadoc-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820008" comment="java-21-openjdk-javadoc-zip-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820009" comment="java-21-openjdk-jmods-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820010" comment="java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820011" comment="java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820012" comment="java-21-openjdk-slowdebug-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820013" comment="java-21-openjdk-src-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820014" comment="java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820015" comment="java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820016" comment="java-21-openjdk-static-libs-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820017" comment="java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820018" comment="java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4061" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0265.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0265.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844464" comment="java-1.8.0-openjdk-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844465" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844466" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.402.b06-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844467" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.402.b06-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844468" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844469" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844470" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844471" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844472" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844473" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844474" comment="java-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844475" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844476" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844477" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844478" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844479" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844480" comment="java-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844481" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844482" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844483" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4062" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0266.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0266.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845119" comment="java-11-openjdk-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845120" comment="java-11-openjdk-demo-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845121" comment="java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845122" comment="java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845123" comment="java-11-openjdk-devel-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845124" comment="java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845125" comment="java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845126" comment="java-11-openjdk-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845127" comment="java-11-openjdk-headless-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845128" comment="java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845129" comment="java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845130" comment="java-11-openjdk-javadoc-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845131" comment="java-11-openjdk-javadoc-zip-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845132" comment="java-11-openjdk-jmods-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845133" comment="java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845134" comment="java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845135" comment="java-11-openjdk-slowdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845136" comment="java-11-openjdk-src-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845137" comment="java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845138" comment="java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845139" comment="java-11-openjdk-static-libs-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845140" comment="java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845141" comment="java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4063" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20932" ref_url="https://www.suse.com/security/cve/CVE-2024-20932/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0267.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0267.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20932/">CVE-2024-20932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20932">CVE-2024-20932 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849165" comment="java-17-openjdk-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849166" comment="java-17-openjdk-demo-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849167" comment="java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849168" comment="java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849169" comment="java-17-openjdk-devel-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849170" comment="java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849171" comment="java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849172" comment="java-17-openjdk-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849173" comment="java-17-openjdk-headless-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849174" comment="java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849175" comment="java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849176" comment="java-17-openjdk-javadoc-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849177" comment="java-17-openjdk-javadoc-zip-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849178" comment="java-17-openjdk-jmods-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849179" comment="java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849180" comment="java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849181" comment="java-17-openjdk-slowdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849182" comment="java-17-openjdk-src-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849183" comment="java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849184" comment="java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849185" comment="java-17-openjdk-static-libs-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849186" comment="java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849187" comment="java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4064" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5363" ref_url="https://www.suse.com/security/cve/CVE-2023-5363/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0310.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0310.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5363/">CVE-2023-5363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5363">CVE-2023-5363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844796" comment="openssl-3.0.7-25.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844797" comment="openssl-devel-3.0.7-25.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844798" comment="openssl-libs-3.0.7-25.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844799" comment="openssl-perl-3.0.7-25.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4065" version="1" class="patch">
	<metadata>
		<title>security update for php (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0567" ref_url="https://www.suse.com/security/cve/CVE-2023-0567/" source="CVE"/>
		<reference ref_id="CVE-2023-0568" ref_url="https://www.suse.com/security/cve/CVE-2023-0568/" source="CVE"/>
		<reference ref_id="CVE-2023-0662" ref_url="https://www.suse.com/security/cve/CVE-2023-0662/" source="CVE"/>
		<reference ref_id="CVE-2023-3247" ref_url="https://www.suse.com/security/cve/CVE-2023-3247/" source="CVE"/>
		<reference ref_id="CVE-2023-3823" ref_url="https://www.suse.com/security/cve/CVE-2023-3823/" source="CVE"/>
		<reference ref_id="CVE-2023-3824" ref_url="https://www.suse.com/security/cve/CVE-2023-3824/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0387.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0387.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0567/">CVE-2023-0567 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0567">CVE-2023-0567 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0568/">CVE-2023-0568 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0568">CVE-2023-0568 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0662/">CVE-2023-0662 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0662">CVE-2023-0662 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3247/">CVE-2023-3247 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3247">CVE-2023-3247 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3823/">CVE-2023-3823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3823">CVE-2023-3823 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3824/">CVE-2023-3824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3824">CVE-2023-3824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844596" comment="php-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844597" comment="php-bcmath-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844598" comment="php-cli-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844599" comment="php-common-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844600" comment="php-dba-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844601" comment="php-dbg-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844602" comment="php-devel-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844603" comment="php-embedded-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844604" comment="php-enchant-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844605" comment="php-ffi-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844606" comment="php-fpm-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844607" comment="php-gd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844608" comment="php-gmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844609" comment="php-intl-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844610" comment="php-ldap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844611" comment="php-mbstring-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844612" comment="php-mysqlnd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844613" comment="php-odbc-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844614" comment="php-opcache-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844615" comment="php-pdo-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844616" comment="php-pgsql-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844617" comment="php-process-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844618" comment="php-snmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844619" comment="php-soap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844620" comment="php-xml-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4066" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3545" ref_url="https://www.suse.com/security/cve/CVE-2022-3545/" source="CVE"/>
		<reference ref_id="CVE-2022-36402" ref_url="https://www.suse.com/security/cve/CVE-2022-36402/" source="CVE"/>
		<reference ref_id="CVE-2022-41858" ref_url="https://www.suse.com/security/cve/CVE-2022-41858/" source="CVE"/>
		<reference ref_id="CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166/" source="CVE"/>
		<reference ref_id="CVE-2023-2176" ref_url="https://www.suse.com/security/cve/CVE-2023-2176/" source="CVE"/>
		<reference ref_id="CVE-2023-3777" ref_url="https://www.suse.com/security/cve/CVE-2023-3777/" source="CVE"/>
		<reference ref_id="CVE-2023-3812" ref_url="https://www.suse.com/security/cve/CVE-2023-3812/" source="CVE"/>
		<reference ref_id="CVE-2023-38409" ref_url="https://www.suse.com/security/cve/CVE-2023-38409/" source="CVE"/>
		<reference ref_id="CVE-2023-4015" ref_url="https://www.suse.com/security/cve/CVE-2023-4015/" source="CVE"/>
		<reference ref_id="CVE-2023-40283" ref_url="https://www.suse.com/security/cve/CVE-2023-40283/" source="CVE"/>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<reference ref_id="CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<reference ref_id="CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813/" source="CVE"/>
		<reference ref_id="CVE-2023-5178" ref_url="https://www.suse.com/security/cve/CVE-2023-5178/" source="CVE"/>
		<reference ref_id="CVE-2023-5633" ref_url="https://www.suse.com/security/cve/CVE-2023-5633/" source="CVE"/>
		<reference ref_id="CVE-2023-6679" ref_url="https://www.suse.com/security/cve/CVE-2023-6679/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0461.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0461.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3545/">CVE-2022-3545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3545">CVE-2022-3545 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36402/">CVE-2022-36402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36402">CVE-2022-36402 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41858/">CVE-2022-41858 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41858">CVE-2022-41858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2176/">CVE-2023-2176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2176">CVE-2023-2176 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3777/">CVE-2023-3777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3812/">CVE-2023-3812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3812">CVE-2023-3812 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38409/">CVE-2023-38409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409">CVE-2023-38409 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4015/">CVE-2023-4015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4015">CVE-2023-4015 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40283/">CVE-2023-40283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5178/">CVE-2023-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5633/">CVE-2023-5633 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5633">CVE-2023-5633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6679/">CVE-2023-6679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6679">CVE-2023-6679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4067" version="1" class="patch">
	<metadata>
		<title>security update for rpm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-35937" ref_url="https://www.suse.com/security/cve/CVE-2021-35937/" source="CVE"/>
		<reference ref_id="CVE-2021-35938" ref_url="https://www.suse.com/security/cve/CVE-2021-35938/" source="CVE"/>
		<reference ref_id="CVE-2021-35939" ref_url="https://www.suse.com/security/cve/CVE-2021-35939/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0463.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0463.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35937/">CVE-2021-35937 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35937">CVE-2021-35937 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35938/">CVE-2021-35938 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35938">CVE-2021-35938 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35939/">CVE-2021-35939 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35939">CVE-2021-35939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844503" comment="python3-rpm-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844504" comment="rpm-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844505" comment="rpm-apidocs-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844506" comment="rpm-build-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844507" comment="rpm-build-libs-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844508" comment="rpm-cron-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844509" comment="rpm-devel-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844510" comment="rpm-libs-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844511" comment="rpm-plugin-audit-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844512" comment="rpm-plugin-fapolicyd-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844513" comment="rpm-plugin-ima-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844514" comment="rpm-plugin-selinux-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844515" comment="rpm-plugin-syslog-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844516" comment="rpm-plugin-systemd-inhibit-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844517" comment="rpm-sign-4.16.1.3-27.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844518" comment="rpm-sign-libs-4.16.1.3-27.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4068" version="1" class="patch">
	<metadata>
		<title>security update for python-urllib3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0464.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0464.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845159" comment="python3-urllib3-1.26.5-3.el9_3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4069" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-7104" ref_url="https://www.suse.com/security/cve/CVE-2023-7104/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0465.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0465.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-7104/">CVE-2023-7104 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7104">CVE-2023-7104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844800" comment="sqlite-3.34.1-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844801" comment="sqlite-devel-3.34.1-7.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844802" comment="sqlite-libs-3.34.1-7.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4070" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0466.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0466.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845160" comment="python-unversioned-command-3.9.18-1.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845161" comment="python3-3.9.18-1.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845162" comment="python3-debug-3.9.18-1.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845163" comment="python3-devel-3.9.18-1.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845164" comment="python3-idle-3.9.18-1.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845165" comment="python3-libs-3.9.18-1.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845166" comment="python3-test-3.9.18-1.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845167" comment="python3-tkinter-3.9.18-1.el9_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4071" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4001" ref_url="https://www.suse.com/security/cve/CVE-2023-4001/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0468.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0468.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4001/">CVE-2023-4001 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4001">CVE-2023-4001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845912" comment="grub2-common-2.06-70.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845913" comment="grub2-efi-x64-2.06-70.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845914" comment="grub2-efi-x64-cdboot-2.06-70.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845915" comment="grub2-efi-x64-modules-2.06-70.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845916" comment="grub2-pc-2.06-70.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845917" comment="grub2-pc-modules-2.06-70.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845918" comment="grub2-tools-2.06-70.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845919" comment="grub2-tools-efi-2.06-70.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845920" comment="grub2-tools-extra-2.06-70.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845921" comment="grub2-tools-minimal-2.06-70.el9_3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4072" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-41080" ref_url="https://www.suse.com/security/cve/CVE-2023-41080/" source="CVE"/>
		<reference ref_id="CVE-2023-42794" ref_url="https://www.suse.com/security/cve/CVE-2023-42794/" source="CVE"/>
		<reference ref_id="CVE-2023-42795" ref_url="https://www.suse.com/security/cve/CVE-2023-42795/" source="CVE"/>
		<reference ref_id="CVE-2023-45648" ref_url="https://www.suse.com/security/cve/CVE-2023-45648/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0474.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0474.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41080/">CVE-2023-41080 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41080">CVE-2023-41080 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42794/">CVE-2023-42794 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42794">CVE-2023-42794 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-42795/">CVE-2023-42795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42795">CVE-2023-42795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45648/">CVE-2023-45648 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45648">CVE-2023-45648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849878" comment="tomcat-9.0.62-37.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849879" comment="tomcat-admin-webapps-9.0.62-37.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849880" comment="tomcat-docs-webapp-9.0.62-37.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849881" comment="tomcat-el-3.0-api-9.0.62-37.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849882" comment="tomcat-jsp-2.3-api-9.0.62-37.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849883" comment="tomcat-lib-9.0.62-37.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849884" comment="tomcat-servlet-4.0-api-9.0.62-37.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849885" comment="tomcat-webapps-9.0.62-37.el9_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4073" version="1" class="patch">
	<metadata>
		<title>security update for frr (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-38406" ref_url="https://www.suse.com/security/cve/CVE-2023-38406/" source="CVE"/>
		<reference ref_id="CVE-2023-38407" ref_url="https://www.suse.com/security/cve/CVE-2023-38407/" source="CVE"/>
		<reference ref_id="CVE-2023-47234" ref_url="https://www.suse.com/security/cve/CVE-2023-47234/" source="CVE"/>
		<reference ref_id="CVE-2023-47235" ref_url="https://www.suse.com/security/cve/CVE-2023-47235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0477.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0477.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38406/">CVE-2023-38406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38406">CVE-2023-38406 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38407/">CVE-2023-38407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38407">CVE-2023-38407 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47234/">CVE-2023-47234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47234">CVE-2023-47234 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47235/">CVE-2023-47235 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47235">CVE-2023-47235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872198" comment="frr-8.3.1-11.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872199" comment="frr-selinux-8.3.1-11.el9_3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4074" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5981" ref_url="https://www.suse.com/security/cve/CVE-2023-5981/" source="CVE"/>
		<reference ref_id="CVE-2024-0553" ref_url="https://www.suse.com/security/cve/CVE-2024-0553/" source="CVE"/>
		<reference ref_id="CVE-2024-0567" ref_url="https://www.suse.com/security/cve/CVE-2024-0567/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0533.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0533.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5981/">CVE-2023-5981 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5981">CVE-2023-5981 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0553/">CVE-2024-0553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0553">CVE-2024-0553 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0567/">CVE-2024-0567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0567">CVE-2024-0567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844803" comment="gnutls-3.7.6-23.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844804" comment="gnutls-c++-3.7.6-23.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844805" comment="gnutls-dane-3.7.6-23.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844806" comment="gnutls-devel-3.7.6-23.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844807" comment="gnutls-utils-3.7.6-23.el9_3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4075" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816/" source="CVE"/>
		<reference ref_id="CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229/" source="CVE"/>
		<reference ref_id="CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885/" source="CVE"/>
		<reference ref_id="CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0557.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0557.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846318" comment="tigervnc-1.13.1-3.el9_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846319" comment="tigervnc-icons-1.13.1-3.el9_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846320" comment="tigervnc-license-1.13.1-3.el9_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846321" comment="tigervnc-selinux-1.13.1-3.el9_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846322" comment="tigervnc-server-1.13.1-3.el9_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846323" comment="tigervnc-server-minimal-1.13.1-3.el9_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846324" comment="tigervnc-server-module-1.13.1-3.el9_3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4076" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741/" source="CVE"/>
		<reference ref_id="CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742/" source="CVE"/>
		<reference ref_id="CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746/" source="CVE"/>
		<reference ref_id="CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747/" source="CVE"/>
		<reference ref_id="CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749/" source="CVE"/>
		<reference ref_id="CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750/" source="CVE"/>
		<reference ref_id="CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751/" source="CVE"/>
		<reference ref_id="CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753/" source="CVE"/>
		<reference ref_id="CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0602.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0602.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845293" comment="thunderbird-115.7.0-1.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4077" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741/" source="CVE"/>
		<reference ref_id="CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742/" source="CVE"/>
		<reference ref_id="CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746/" source="CVE"/>
		<reference ref_id="CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747/" source="CVE"/>
		<reference ref_id="CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749/" source="CVE"/>
		<reference ref_id="CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750/" source="CVE"/>
		<reference ref_id="CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751/" source="CVE"/>
		<reference ref_id="CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753/" source="CVE"/>
		<reference ref_id="CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0603.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0603.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845168" comment="firefox-115.7.0-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845169" comment="firefox-x11-115.7.0-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4078" version="1" class="patch">
	<metadata>
		<title>security update for runc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0670.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0670.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845594" comment="runc-1.1.12-1.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4079" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44441" ref_url="https://www.suse.com/security/cve/CVE-2023-44441/" source="CVE"/>
		<reference ref_id="CVE-2023-44442" ref_url="https://www.suse.com/security/cve/CVE-2023-44442/" source="CVE"/>
		<reference ref_id="CVE-2023-44443" ref_url="https://www.suse.com/security/cve/CVE-2023-44443/" source="CVE"/>
		<reference ref_id="CVE-2023-44444" ref_url="https://www.suse.com/security/cve/CVE-2023-44444/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0675.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0675.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44441/">CVE-2023-44441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44441">CVE-2023-44441 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44442/">CVE-2023-44442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44442">CVE-2023-44442 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44443/">CVE-2023-44443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44443">CVE-2023-44443 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-44444/">CVE-2023-44444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44444">CVE-2023-44444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872200" comment="gimp-2.99.8-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872201" comment="gimp-libs-2.99.8-4.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4080" version="1" class="patch">
	<metadata>
		<title>security update for nss (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-6135" ref_url="https://www.suse.com/security/cve/CVE-2023-6135/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0790.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0790.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6135/">CVE-2023-6135 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6135">CVE-2023-6135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848261" comment="nspr-4.35.0-6.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848262" comment="nspr-devel-4.35.0-6.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848263" comment="nss-3.90.0-6.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848264" comment="nss-devel-3.90.0-6.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848265" comment="nss-softokn-3.90.0-6.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848266" comment="nss-softokn-devel-3.90.0-6.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848267" comment="nss-softokn-freebl-3.90.0-6.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848268" comment="nss-softokn-freebl-devel-3.90.0-6.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848269" comment="nss-sysinit-3.90.0-6.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848270" comment="nss-tools-3.90.0-6.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848271" comment="nss-util-3.90.0-6.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848272" comment="nss-util-devel-3.90.0-6.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4081" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-46233" ref_url="https://www.suse.com/security/cve/CVE-2023-46233/" source="CVE"/>
		<reference ref_id="CVE-2024-21386" ref_url="https://www.suse.com/security/cve/CVE-2024-21386/" source="CVE"/>
		<reference ref_id="CVE-2024-21404" ref_url="https://www.suse.com/security/cve/CVE-2024-21404/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0805.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0805.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46233/">CVE-2023-46233 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46233">CVE-2023-46233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21386/">CVE-2024-21386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21386">CVE-2024-21386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21404/">CVE-2024-21404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21404">CVE-2024-21404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872202" comment="aspnetcore-runtime-7.0-7.0.16-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872203" comment="aspnetcore-targeting-pack-7.0-7.0.16-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872204" comment="dotnet-apphost-pack-7.0-7.0.16-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872205" comment="dotnet-hostfxr-7.0-7.0.16-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872206" comment="dotnet-runtime-7.0-7.0.16-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872207" comment="dotnet-sdk-7.0-7.0.116-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872208" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872209" comment="dotnet-targeting-pack-7.0-7.0.16-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872210" comment="dotnet-templates-7.0-7.0.116-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4082" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21386" ref_url="https://www.suse.com/security/cve/CVE-2024-21386/" source="CVE"/>
		<reference ref_id="CVE-2024-21404" ref_url="https://www.suse.com/security/cve/CVE-2024-21404/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0807.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0807.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21386/">CVE-2024-21386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21386">CVE-2024-21386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21404/">CVE-2024-21404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21404">CVE-2024-21404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846371" comment="aspnetcore-runtime-6.0-6.0.27-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846372" comment="aspnetcore-targeting-pack-6.0-6.0.27-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846373" comment="dotnet-apphost-pack-6.0-6.0.27-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846374" comment="dotnet-hostfxr-6.0-6.0.27-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846375" comment="dotnet-runtime-6.0-6.0.27-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846376" comment="dotnet-sdk-6.0-6.0.127-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846377" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846378" comment="dotnet-targeting-pack-6.0-6.0.27-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846379" comment="dotnet-templates-6.0-6.0.127-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4083" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-28486" ref_url="https://www.suse.com/security/cve/CVE-2023-28486/" source="CVE"/>
		<reference ref_id="CVE-2023-28487" ref_url="https://www.suse.com/security/cve/CVE-2023-28487/" source="CVE"/>
		<reference ref_id="CVE-2023-42465" ref_url="https://www.suse.com/security/cve/CVE-2023-42465/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0811.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0811.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28486/">CVE-2023-28486 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28486">CVE-2023-28486 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28487/">CVE-2023-28487 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28487">CVE-2023-28487 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42465/">CVE-2023-42465 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848258" comment="sudo-1.9.5p2-10.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848259" comment="sudo-python-plugin-1.9.5p2-10.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4084" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21386" ref_url="https://www.suse.com/security/cve/CVE-2024-21386/" source="CVE"/>
		<reference ref_id="CVE-2024-21404" ref_url="https://www.suse.com/security/cve/CVE-2024-21404/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0848.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0848.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21386/">CVE-2024-21386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21386">CVE-2024-21386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21404/">CVE-2024-21404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21404">CVE-2024-21404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872211" comment="aspnetcore-runtime-8.0-8.0.2-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872212" comment="aspnetcore-runtime-dbg-8.0-8.0.2-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872213" comment="aspnetcore-targeting-pack-8.0-8.0.2-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872214" comment="dotnet-apphost-pack-8.0-8.0.2-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872215" comment="dotnet-host-8.0.2-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872216" comment="dotnet-hostfxr-8.0-8.0.2-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872217" comment="dotnet-runtime-8.0-8.0.2-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872218" comment="dotnet-runtime-dbg-8.0-8.0.2-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872219" comment="dotnet-sdk-8.0-8.0.102-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872220" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872221" comment="dotnet-sdk-dbg-8.0-8.0.102-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872222" comment="dotnet-targeting-pack-8.0-8.0.2-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872223" comment="dotnet-templates-8.0-8.0.102-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872224" comment="netstandard-targeting-pack-2.1-8.0.102-2.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4085" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0950.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0950.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806688" comment="pg_repack-1.4.8-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848886" comment="postgresql-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848887" comment="postgresql-contrib-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848888" comment="postgresql-docs-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848889" comment="postgresql-plperl-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848890" comment="postgresql-plpython3-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848891" comment="postgresql-pltcl-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848892" comment="postgresql-private-devel-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848893" comment="postgresql-private-libs-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848894" comment="postgresql-server-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848895" comment="postgresql-server-devel-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848896" comment="postgresql-static-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848897" comment="postgresql-test-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848898" comment="postgresql-test-rpm-macros-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848899" comment="postgresql-upgrade-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848900" comment="postgresql-upgrade-devel-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4086" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0951.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0951.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848901" comment="postgresql-13.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848902" comment="postgresql-contrib-13.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848903" comment="postgresql-docs-13.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848904" comment="postgresql-plperl-13.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848905" comment="postgresql-plpython3-13.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848906" comment="postgresql-pltcl-13.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848907" comment="postgresql-private-devel-13.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848908" comment="postgresql-private-libs-13.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848909" comment="postgresql-server-13.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848910" comment="postgresql-server-devel-13.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848911" comment="postgresql-static-13.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848912" comment="postgresql-test-13.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848913" comment="postgresql-upgrade-13.14-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848914" comment="postgresql-upgrade-devel-13.14-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4087" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0952.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0952.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849200" comment="firefox-115.8.0-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849201" comment="firefox-x11-115.8.0-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4088" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0963.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0963.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849711" comment="thunderbird-115.8.0-1.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4089" version="1" class="patch">
	<metadata>
		<title>security update for opensc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5992" ref_url="https://www.suse.com/security/cve/CVE-2023-5992/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0966.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0966.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-5992/">CVE-2023-5992 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5992">CVE-2023-5992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849490" comment="opensc-0.23.0-4.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4090" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0977.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0977.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849202" comment="python3-unbound-1.16.2-3.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849203" comment="unbound-1.16.2-3.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849204" comment="unbound-devel-1.16.2-3.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849205" comment="unbound-libs-1.16.2-3.el9_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4091" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-9632" ref_url="https://www.suse.com/security/cve/CVE-2024-9632/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10090.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10090.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9632/">CVE-2024-9632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9632">CVE-2024-9632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953522" comment="tigervnc-1.14.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953523" comment="tigervnc-icons-1.14.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953524" comment="tigervnc-license-1.14.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953525" comment="tigervnc-selinux-1.14.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953526" comment="tigervnc-server-1.14.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953527" comment="tigervnc-server-minimal-1.14.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953528" comment="tigervnc-server-module-1.14.1-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4092" version="1" class="patch">
	<metadata>
		<title>security update for perl-App-cpanminus (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-45321" ref_url="https://www.suse.com/security/cve/CVE-2024-45321/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10218.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10218.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45321/">CVE-2024-45321 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45321">CVE-2024-45321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955015" comment="perl-App-cpanminus-1.7044-14.1.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4093" version="1" class="patch">
	<metadata>
		<title>security update for pam (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-10963" ref_url="https://www.suse.com/security/cve/CVE-2024-10963/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10244.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10244.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10963/">CVE-2024-10963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10963">CVE-2024-10963 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955016" comment="pam-1.5.1-22.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955017" comment="pam-devel-1.5.1-22.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955018" comment="pam-docs-1.5.1-22.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4094" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009/" source="CVE"/>
		<reference ref_id="CVE-2024-42244" ref_url="https://www.suse.com/security/cve/CVE-2024-42244/" source="CVE"/>
		<reference ref_id="CVE-2024-46679" ref_url="https://www.suse.com/security/cve/CVE-2024-46679/" source="CVE"/>
		<reference ref_id="CVE-2024-50226" ref_url="https://www.suse.com/security/cve/CVE-2024-50226/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10274.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10274.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42244/">CVE-2024-42244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42244">CVE-2024-42244 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46679/">CVE-2024-46679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50226/">CVE-2024-50226 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50226">CVE-2024-50226 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955019" comment="bpftool-7.4.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955020" comment="kernel-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955021" comment="kernel-abi-stablelists-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955022" comment="kernel-core-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955023" comment="kernel-cross-headers-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955024" comment="kernel-debug-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955025" comment="kernel-debug-core-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955028" comment="kernel-debug-modules-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955029" comment="kernel-debug-modules-core-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955030" comment="kernel-debug-modules-extra-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955031" comment="kernel-debug-uki-virt-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955034" comment="kernel-doc-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955035" comment="kernel-headers-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955036" comment="kernel-modules-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955037" comment="kernel-modules-core-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955038" comment="kernel-modules-extra-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955039" comment="kernel-tools-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955040" comment="kernel-tools-libs-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955042" comment="kernel-uki-virt-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955043" comment="kernel-uki-virt-addons-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955044" comment="libperf-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955045" comment="perf-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955046" comment="python3-perf-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955047" comment="rtla-5.14.0-503.15.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955048" comment="rv-5.14.0-503.15.1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4095" version="1" class="patch">
	<metadata>
		<title>security update for tuned (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-52336" ref_url="https://www.suse.com/security/cve/CVE-2024-52336/" source="CVE"/>
		<reference ref_id="CVE-2024-52337" ref_url="https://www.suse.com/security/cve/CVE-2024-52337/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10384.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10384.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52336/">CVE-2024-52336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52336">CVE-2024-52336 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52337/">CVE-2024-52337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52337">CVE-2024-52337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955680" comment="tuned-2.24.0-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955681" comment="tuned-gtk-2.24.0-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955682" comment="tuned-ppd-2.24.0-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955683" comment="tuned-profiles-atomic-2.24.0-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955684" comment="tuned-profiles-cpu-partitioning-2.24.0-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955685" comment="tuned-profiles-mssql-2.24.0-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955686" comment="tuned-profiles-oracle-2.24.0-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955687" comment="tuned-profiles-postgresql-2.24.0-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955688" comment="tuned-profiles-spectrumscale-2.24.0-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955689" comment="tuned-utils-2.24.0-2.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4096" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-44309" ref_url="https://www.suse.com/security/cve/CVE-2024-44309/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10472.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10472.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-44309/">CVE-2024-44309 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44309">CVE-2024-44309 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955240" comment="webkit2gtk3-2.46.3-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955241" comment="webkit2gtk3-devel-2.46.3-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955242" comment="webkit2gtk3-jsc-2.46.3-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955243" comment="webkit2gtk3-jsc-devel-2.46.3-2.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4097" version="1" class="patch">
	<metadata>
		<title>security update for python-tornado (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-52804" ref_url="https://www.suse.com/security/cve/CVE-2024-52804/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10590.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10590.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52804/">CVE-2024-52804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52804">CVE-2024-52804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955690" comment="python3-tornado-6.4.2-1.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4098" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-11159" ref_url="https://www.suse.com/security/cve/CVE-2024-11159/" source="CVE"/>
		<reference ref_id="CVE-2024-11692" ref_url="https://www.suse.com/security/cve/CVE-2024-11692/" source="CVE"/>
		<reference ref_id="CVE-2024-11694" ref_url="https://www.suse.com/security/cve/CVE-2024-11694/" source="CVE"/>
		<reference ref_id="CVE-2024-11695" ref_url="https://www.suse.com/security/cve/CVE-2024-11695/" source="CVE"/>
		<reference ref_id="CVE-2024-11696" ref_url="https://www.suse.com/security/cve/CVE-2024-11696/" source="CVE"/>
		<reference ref_id="CVE-2024-11697" ref_url="https://www.suse.com/security/cve/CVE-2024-11697/" source="CVE"/>
		<reference ref_id="CVE-2024-11699" ref_url="https://www.suse.com/security/cve/CVE-2024-11699/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10592.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10592.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11159/">CVE-2024-11159 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11159">CVE-2024-11159 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11692/">CVE-2024-11692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11692">CVE-2024-11692 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11694/">CVE-2024-11694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11694">CVE-2024-11694 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11695/">CVE-2024-11695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11695">CVE-2024-11695 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11696/">CVE-2024-11696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11696">CVE-2024-11696 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11697/">CVE-2024-11697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11697">CVE-2024-11697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11699/">CVE-2024-11699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11699">CVE-2024-11699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955691" comment="thunderbird-128.5.0-1.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4099" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-11692" ref_url="https://www.suse.com/security/cve/CVE-2024-11692/" source="CVE"/>
		<reference ref_id="CVE-2024-11694" ref_url="https://www.suse.com/security/cve/CVE-2024-11694/" source="CVE"/>
		<reference ref_id="CVE-2024-11695" ref_url="https://www.suse.com/security/cve/CVE-2024-11695/" source="CVE"/>
		<reference ref_id="CVE-2024-11696" ref_url="https://www.suse.com/security/cve/CVE-2024-11696/" source="CVE"/>
		<reference ref_id="CVE-2024-11697" ref_url="https://www.suse.com/security/cve/CVE-2024-11697/" source="CVE"/>
		<reference ref_id="CVE-2024-11699" ref_url="https://www.suse.com/security/cve/CVE-2024-11699/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10702.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10702.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11692/">CVE-2024-11692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11692">CVE-2024-11692 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11694/">CVE-2024-11694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11694">CVE-2024-11694 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11695/">CVE-2024-11695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11695">CVE-2024-11695 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11696/">CVE-2024-11696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11696">CVE-2024-11696 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11697/">CVE-2024-11697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11697">CVE-2024-11697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11699/">CVE-2024-11699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11699">CVE-2024-11699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957245" comment="firefox-128.5.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957246" comment="firefox-x11-128.5.1-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4100" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-45230" ref_url="https://www.suse.com/security/cve/CVE-2023-45230/" source="CVE"/>
		<reference ref_id="CVE-2023-45234" ref_url="https://www.suse.com/security/cve/CVE-2023-45234/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1075.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1075.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45230/">CVE-2023-45230 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45230">CVE-2023-45230 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45234/">CVE-2023-45234 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45234">CVE-2023-45234 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851378" comment="edk2-ovmf-20230524-4.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851379" comment="edk2-tools-20230524-4.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851380" comment="edk2-tools-doc-20230524-4.el9_3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4101" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10791.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10791.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958991" comment="postgresql-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958992" comment="postgresql-contrib-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958993" comment="postgresql-docs-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958994" comment="postgresql-plperl-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958995" comment="postgresql-plpython3-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958996" comment="postgresql-pltcl-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958997" comment="postgresql-private-devel-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958998" comment="postgresql-private-libs-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958999" comment="postgresql-server-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959000" comment="postgresql-server-devel-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959001" comment="postgresql-static-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959002" comment="postgresql-test-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959003" comment="postgresql-test-rpm-macros-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959004" comment="postgresql-upgrade-13.18-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959005" comment="postgresql-upgrade-devel-13.18-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4102" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-49761" ref_url="https://www.suse.com/security/cve/CVE-2024-49761/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10858.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10858.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49761/">CVE-2024-49761 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49761">CVE-2024-49761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957092" comment="ruby-3.0.7-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957093" comment="ruby-default-gems-3.0.7-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957094" comment="ruby-devel-3.0.7-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957095" comment="ruby-doc-3.0.7-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957096" comment="ruby-libs-3.0.7-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957097" comment="rubygem-bigdecimal-3.0.0-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957098" comment="rubygem-bundler-2.2.33-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957099" comment="rubygem-io-console-0.5.7-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957100" comment="rubygem-irb-1.3.5-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957101" comment="rubygem-json-2.5.1-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957102" comment="rubygem-minitest-5.14.2-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957103" comment="rubygem-power_assert-1.2.1-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957104" comment="rubygem-psych-3.3.2-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957105" comment="rubygem-rake-13.0.3-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957106" comment="rubygem-rbs-1.4.0-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957107" comment="rubygem-rdoc-6.3.4.1-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957108" comment="rubygem-rexml-3.2.5-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957109" comment="rubygem-rss-0.2.9-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957110" comment="rubygem-test-unit-3.3.7-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957111" comment="rubygem-typeprof-0.15.2-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957112" comment="rubygems-3.2.33-163.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957113" comment="rubygems-devel-3.2.33-163.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4103" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-49761" ref_url="https://www.suse.com/security/cve/CVE-2024-49761/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10860.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10860.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49761/">CVE-2024-49761 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49761">CVE-2024-49761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957114" comment="ruby-3.1.5-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957115" comment="ruby-bundled-gems-3.1.5-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957116" comment="ruby-default-gems-3.1.5-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957117" comment="ruby-devel-3.1.5-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957118" comment="ruby-doc-3.1.5-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957119" comment="ruby-libs-3.1.5-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957120" comment="rubygem-bigdecimal-3.1.1-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957121" comment="rubygem-bundler-2.3.27-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957122" comment="rubygem-io-console-0.5.11-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957123" comment="rubygem-irb-1.4.1-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957124" comment="rubygem-json-2.6.1-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957125" comment="rubygem-minitest-5.15.0-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872260" comment="rubygem-mysql2-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872261" comment="rubygem-mysql2-doc-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872262" comment="rubygem-pg-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872263" comment="rubygem-pg-doc-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957126" comment="rubygem-power_assert-2.0.1-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957127" comment="rubygem-psych-4.0.4-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957128" comment="rubygem-rake-13.0.6-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957129" comment="rubygem-rbs-2.7.0-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957130" comment="rubygem-rdoc-6.4.1.1-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957131" comment="rubygem-rexml-3.2.5-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957132" comment="rubygem-rss-0.2.9-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957133" comment="rubygem-test-unit-3.5.3-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957134" comment="rubygem-typeprof-0.21.3-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957135" comment="rubygems-3.3.27-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957136" comment="rubygems-devel-3.3.27-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4104" version="1" class="patch">
	<metadata>
		<title>security update for redis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-41053" ref_url="https://www.suse.com/security/cve/CVE-2023-41053/" source="CVE"/>
		<reference ref_id="CVE-2023-45145" ref_url="https://www.suse.com/security/cve/CVE-2023-45145/" source="CVE"/>
		<reference ref_id="CVE-2024-31227" ref_url="https://www.suse.com/security/cve/CVE-2024-31227/" source="CVE"/>
		<reference ref_id="CVE-2024-31228" ref_url="https://www.suse.com/security/cve/CVE-2024-31228/" source="CVE"/>
		<reference ref_id="CVE-2024-31449" ref_url="https://www.suse.com/security/cve/CVE-2024-31449/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10869.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10869.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41053/">CVE-2023-41053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41053">CVE-2023-41053 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45145/">CVE-2023-45145 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45145">CVE-2023-45145 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31227/">CVE-2024-31227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31227">CVE-2024-31227 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31228/">CVE-2024-31228 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31228">CVE-2024-31228 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31449/">CVE-2024-31449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31449">CVE-2024-31449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956891" comment="redis-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956892" comment="redis-devel-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956893" comment="redis-doc-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4105" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-26615" ref_url="https://www.suse.com/security/cve/CVE-2024-26615/" source="CVE"/>
		<reference ref_id="CVE-2024-43854" ref_url="https://www.suse.com/security/cve/CVE-2024-43854/" source="CVE"/>
		<reference ref_id="CVE-2024-44994" ref_url="https://www.suse.com/security/cve/CVE-2024-44994/" source="CVE"/>
		<reference ref_id="CVE-2024-45018" ref_url="https://www.suse.com/security/cve/CVE-2024-45018/" source="CVE"/>
		<reference ref_id="CVE-2024-46695" ref_url="https://www.suse.com/security/cve/CVE-2024-46695/" source="CVE"/>
		<reference ref_id="CVE-2024-49949" ref_url="https://www.suse.com/security/cve/CVE-2024-49949/" source="CVE"/>
		<reference ref_id="CVE-2024-50251" ref_url="https://www.suse.com/security/cve/CVE-2024-50251/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10939.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10939.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26615/">CVE-2024-26615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26615">CVE-2024-26615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43854/">CVE-2024-43854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44994/">CVE-2024-44994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44994">CVE-2024-44994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45018/">CVE-2024-45018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45018">CVE-2024-45018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46695/">CVE-2024-46695 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46695">CVE-2024-46695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49949/">CVE-2024-49949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50251/">CVE-2024-50251 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50251">CVE-2024-50251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957437" comment="bpftool-7.4.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957438" comment="kernel-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957439" comment="kernel-abi-stablelists-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957440" comment="kernel-core-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957441" comment="kernel-cross-headers-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957442" comment="kernel-debug-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957443" comment="kernel-debug-core-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957446" comment="kernel-debug-modules-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957447" comment="kernel-debug-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957448" comment="kernel-debug-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957449" comment="kernel-debug-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957452" comment="kernel-doc-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957453" comment="kernel-headers-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957454" comment="kernel-modules-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957455" comment="kernel-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957456" comment="kernel-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957457" comment="kernel-tools-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957458" comment="kernel-tools-libs-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957460" comment="kernel-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957461" comment="kernel-uki-virt-addons-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957462" comment="libperf-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957463" comment="perf-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957464" comment="python3-perf-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957465" comment="rtla-5.14.0-503.16.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957466" comment="rv-5.14.0-503.16.1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4106" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2756" ref_url="https://www.suse.com/security/cve/CVE-2024-2756/" source="CVE"/>
		<reference ref_id="CVE-2024-3096" ref_url="https://www.suse.com/security/cve/CVE-2024-3096/" source="CVE"/>
		<reference ref_id="CVE-2024-5458" ref_url="https://www.suse.com/security/cve/CVE-2024-5458/" source="CVE"/>
		<reference ref_id="CVE-2024-8925" ref_url="https://www.suse.com/security/cve/CVE-2024-8925/" source="CVE"/>
		<reference ref_id="CVE-2024-8927" ref_url="https://www.suse.com/security/cve/CVE-2024-8927/" source="CVE"/>
		<reference ref_id="CVE-2024-9026" ref_url="https://www.suse.com/security/cve/CVE-2024-9026/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10949.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10949.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2756/">CVE-2024-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2756">CVE-2024-2756 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3096/">CVE-2024-3096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3096">CVE-2024-3096 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-5458/">CVE-2024-5458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5458">CVE-2024-5458 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8925/">CVE-2024-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8925">CVE-2024-8925 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8927/">CVE-2024-8927 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8927">CVE-2024-8927 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9026/">CVE-2024-9026 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9026">CVE-2024-9026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957467" comment="apcu-panel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957468" comment="php-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957469" comment="php-bcmath-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957470" comment="php-cli-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957471" comment="php-common-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957472" comment="php-dba-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957473" comment="php-dbg-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957474" comment="php-devel-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957475" comment="php-embedded-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957476" comment="php-enchant-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957477" comment="php-ffi-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957478" comment="php-fpm-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957479" comment="php-gd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957480" comment="php-gmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957481" comment="php-intl-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957482" comment="php-ldap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957483" comment="php-mbstring-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957484" comment="php-mysqlnd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957485" comment="php-odbc-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957486" comment="php-opcache-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957487" comment="php-pdo-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957488" comment="php-pecl-apcu-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957489" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957490" comment="php-pecl-rrd-2.0.3-4.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957491" comment="php-pecl-xdebug3-3.2.2-2.module+el9.4.0+20796+bd4564df is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957492" comment="php-pecl-zip-1.22.3-1.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957493" comment="php-pgsql-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957494" comment="php-process-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957495" comment="php-snmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957496" comment="php-soap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957497" comment="php-xml-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4107" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2756" ref_url="https://www.suse.com/security/cve/CVE-2024-2756/" source="CVE"/>
		<reference ref_id="CVE-2024-3096" ref_url="https://www.suse.com/security/cve/CVE-2024-3096/" source="CVE"/>
		<reference ref_id="CVE-2024-5458" ref_url="https://www.suse.com/security/cve/CVE-2024-5458/" source="CVE"/>
		<reference ref_id="CVE-2024-8925" ref_url="https://www.suse.com/security/cve/CVE-2024-8925/" source="CVE"/>
		<reference ref_id="CVE-2024-8927" ref_url="https://www.suse.com/security/cve/CVE-2024-8927/" source="CVE"/>
		<reference ref_id="CVE-2024-9026" ref_url="https://www.suse.com/security/cve/CVE-2024-9026/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10950.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10950.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2756/">CVE-2024-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2756">CVE-2024-2756 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3096/">CVE-2024-3096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3096">CVE-2024-3096 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-5458/">CVE-2024-5458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5458">CVE-2024-5458 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8925/">CVE-2024-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8925">CVE-2024-8925 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8927/">CVE-2024-8927 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8927">CVE-2024-8927 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9026/">CVE-2024-9026 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9026">CVE-2024-9026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957498" comment="php-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957499" comment="php-bcmath-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957500" comment="php-cli-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957501" comment="php-common-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957502" comment="php-dba-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957503" comment="php-dbg-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957504" comment="php-devel-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957505" comment="php-embedded-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957506" comment="php-enchant-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957507" comment="php-ffi-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957508" comment="php-fpm-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957509" comment="php-gd-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957510" comment="php-gmp-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957511" comment="php-intl-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957512" comment="php-ldap-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957513" comment="php-mbstring-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957514" comment="php-mysqlnd-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957515" comment="php-odbc-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957516" comment="php-opcache-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957517" comment="php-pdo-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957518" comment="php-pgsql-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957519" comment="php-process-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957520" comment="php-snmp-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957521" comment="php-soap-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957522" comment="php-xml-8.1.30-1.module+el9.5.0+22481+3e1c6d75 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4108" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-12254" ref_url="https://www.suse.com/security/cve/CVE-2024-12254/" source="CVE"/>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10978.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10978.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-12254/">CVE-2024-12254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12254">CVE-2024-12254 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957523" comment="python3.12-3.12.5-2.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957524" comment="python3.12-debug-3.12.5-2.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957525" comment="python3.12-devel-3.12.5-2.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957526" comment="python3.12-idle-3.12.5-2.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957527" comment="python3.12-libs-3.12.5-2.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957528" comment="python3.12-test-3.12.5-2.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957529" comment="python3.12-tkinter-3.12.5-2.el9_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4109" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397/" source="CVE"/>
		<reference ref_id="CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168/" source="CVE"/>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10983.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10983.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957530" comment="python-unversioned-command-3.9.21-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957531" comment="python3-3.9.21-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957532" comment="python3-debug-3.9.21-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957533" comment="python3-devel-3.9.21-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957534" comment="python3-idle-3.9.21-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957535" comment="python3-libs-3.9.21-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957536" comment="python3-test-3.9.21-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957537" comment="python3-tkinter-3.9.21-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4110" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11111.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11111.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958268" comment="python3.11-3.11.9-7.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958269" comment="python3.11-debug-3.11.9-7.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958270" comment="python3.11-devel-3.11.9-7.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958271" comment="python3.11-idle-3.11.9-7.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958272" comment="python3.11-libs-3.11.9-7.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958273" comment="python3.11-test-3.11.9-7.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958274" comment="python3.11-tkinter-3.11.9-7.el9_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4111" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-47537" ref_url="https://www.suse.com/security/cve/CVE-2024-47537/" source="CVE"/>
		<reference ref_id="CVE-2024-47539" ref_url="https://www.suse.com/security/cve/CVE-2024-47539/" source="CVE"/>
		<reference ref_id="CVE-2024-47540" ref_url="https://www.suse.com/security/cve/CVE-2024-47540/" source="CVE"/>
		<reference ref_id="CVE-2024-47606" ref_url="https://www.suse.com/security/cve/CVE-2024-47606/" source="CVE"/>
		<reference ref_id="CVE-2024-47613" ref_url="https://www.suse.com/security/cve/CVE-2024-47613/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11122.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11122.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47537/">CVE-2024-47537 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47537">CVE-2024-47537 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47539/">CVE-2024-47539 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47539">CVE-2024-47539 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47540/">CVE-2024-47540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47540">CVE-2024-47540 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47606/">CVE-2024-47606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47606">CVE-2024-47606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47613/">CVE-2024-47613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47613">CVE-2024-47613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958275" comment="gstreamer1-plugins-good-1.22.1-3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958276" comment="gstreamer1-plugins-good-gtk-1.22.1-3.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4112" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-47538" ref_url="https://www.suse.com/security/cve/CVE-2024-47538/" source="CVE"/>
		<reference ref_id="CVE-2024-47607" ref_url="https://www.suse.com/security/cve/CVE-2024-47607/" source="CVE"/>
		<reference ref_id="CVE-2024-47615" ref_url="https://www.suse.com/security/cve/CVE-2024-47615/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11123.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11123.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47538/">CVE-2024-47538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47538">CVE-2024-47538 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47607/">CVE-2024-47607 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47607">CVE-2024-47607 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47615/">CVE-2024-47615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47615">CVE-2024-47615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958277" comment="gstreamer1-plugins-base-1.22.1-3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958278" comment="gstreamer1-plugins-base-devel-1.22.1-3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958279" comment="gstreamer1-plugins-base-tools-1.22.1-3.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4113" version="1" class="patch">
	<metadata>
		<title>security update for containernetworking-plugins (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11216.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11216.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958544" comment="containernetworking-plugins-1.5.1-3.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4114" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11217.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11217.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958545" comment="skopeo-1.16.1-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958546" comment="skopeo-tests-1.16.1-2.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4115" version="1" class="patch">
	<metadata>
		<title>security update for edk2-aarch64 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-38796" ref_url="https://www.suse.com/security/cve/CVE-2024-38796/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11219.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11219.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38796/">CVE-2024-38796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38796">CVE-2024-38796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959121" comment="edk2-tools-20240524-6.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959122" comment="edk2-tools-doc-20240524-6.el9_5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4116" version="1" class="patch">
	<metadata>
		<title>security update for unbound-devel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-8508" ref_url="https://www.suse.com/security/cve/CVE-2024-8508/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11232.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11232.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-8508/">CVE-2024-8508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8508">CVE-2024-8508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959006" comment="unbound-devel-1.16.2-8.el9_5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4117" version="1" class="patch">
	<metadata>
		<title>security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-50612" ref_url="https://www.suse.com/security/cve/CVE-2024-50612/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11237.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11237.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50612/">CVE-2024-50612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50612">CVE-2024-50612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959007" comment="libsndfile-1.0.31-8.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959008" comment="libsndfile-devel-1.0.31-8.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959009" comment="libsndfile-utils-1.0.31-8.el9_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4118" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11238.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11238.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958547" comment="python3.11-urllib3-1.26.12-2.el9_5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4119" version="1" class="patch">
	<metadata>
		<title>security update for mpg123 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-10573" ref_url="https://www.suse.com/security/cve/CVE-2024-10573/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11242.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11242.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10573/">CVE-2024-10573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10573">CVE-2024-10573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958880" comment="mpg123-1.32.9-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958881" comment="mpg123-devel-1.32.9-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958882" comment="mpg123-libs-1.32.9-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958883" comment="mpg123-plugins-pulseaudio-1.32.9-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4120" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-46218" ref_url="https://www.suse.com/security/cve/CVE-2023-46218/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1129.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1129.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-46218/">CVE-2023-46218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46218">CVE-2023-46218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849945" comment="curl-7.76.1-26.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849946" comment="curl-minimal-7.76.1-26.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849947" comment="libcurl-7.76.1-26.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849948" comment="libcurl-devel-7.76.1-26.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849949" comment="libcurl-minimal-7.76.1-26.el9_3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4121" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="CVE-2023-51385" ref_url="https://www.suse.com/security/cve/CVE-2023-51385/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1130.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1130.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51385/">CVE-2023-51385 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850276" comment="openssh-8.7p1-34.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850277" comment="openssh-askpass-8.7p1-34.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850278" comment="openssh-clients-8.7p1-34.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850279" comment="openssh-keycat-8.7p1-34.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850280" comment="openssh-server-8.7p1-34.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850281" comment="pam_ssh_agent_auth-0.10.4-5.34.el9_3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4122" version="1" class="patch">
	<metadata>
		<title>security update for golang (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326/" source="CVE"/>
		<reference ref_id="CVE-2023-45285" ref_url="https://www.suse.com/security/cve/CVE-2023-45285/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1131.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1131.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-45285/">CVE-2023-45285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849886" comment="go-toolset-1.20.12-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849887" comment="golang-1.20.12-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849888" comment="golang-bin-1.20.12-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849889" comment="golang-docs-1.20.12-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849890" comment="golang-misc-1.20.12-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849891" comment="golang-src-1.20.12-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849892" comment="golang-tests-1.20.12-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4123" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-46589" ref_url="https://www.suse.com/security/cve/CVE-2023-46589/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1134.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1134.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46589/">CVE-2023-46589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46589">CVE-2023-46589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851381" comment="tomcat-9.0.62-37.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851382" comment="tomcat-admin-webapps-9.0.62-37.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851383" comment="tomcat-docs-webapp-9.0.62-37.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851384" comment="tomcat-el-3.0-api-9.0.62-37.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851385" comment="tomcat-jsp-2.3-api-9.0.62-37.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851386" comment="tomcat-lib-9.0.62-37.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851387" comment="tomcat-servlet-4.0-api-9.0.62-37.el9_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851388" comment="tomcat-webapps-9.0.62-37.el9_3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4124" version="1" class="patch">
	<metadata>
		<title>security update for keylime (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-3674" ref_url="https://www.suse.com/security/cve/CVE-2023-3674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1139.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1139.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3674/">CVE-2023-3674 at SUSE</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3674">CVE-2023-3674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850282" comment="keylime-7.3.0-13.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850283" comment="keylime-base-7.3.0-13.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850284" comment="keylime-registrar-7.3.0-13.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850285" comment="keylime-selinux-7.3.0-13.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850286" comment="keylime-tenant-7.3.0-13.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850287" comment="keylime-verifier-7.3.0-13.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850288" comment="python3-keylime-7.3.0-13.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4125" version="1" class="patch">
	<metadata>
		<title>security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-4899" ref_url="https://www.suse.com/security/cve/CVE-2022-4899/" source="CVE"/>
		<reference ref_id="CVE-2023-21911" ref_url="https://www.suse.com/security/cve/CVE-2023-21911/" source="CVE"/>
		<reference ref_id="CVE-2023-21919" ref_url="https://www.suse.com/security/cve/CVE-2023-21919/" source="CVE"/>
		<reference ref_id="CVE-2023-21920" ref_url="https://www.suse.com/security/cve/CVE-2023-21920/" source="CVE"/>
		<reference ref_id="CVE-2023-21929" ref_url="https://www.suse.com/security/cve/CVE-2023-21929/" source="CVE"/>
		<reference ref_id="CVE-2023-21933" ref_url="https://www.suse.com/security/cve/CVE-2023-21933/" source="CVE"/>
		<reference ref_id="CVE-2023-21935" ref_url="https://www.suse.com/security/cve/CVE-2023-21935/" source="CVE"/>
		<reference ref_id="CVE-2023-21940" ref_url="https://www.suse.com/security/cve/CVE-2023-21940/" source="CVE"/>
		<reference ref_id="CVE-2023-21945" ref_url="https://www.suse.com/security/cve/CVE-2023-21945/" source="CVE"/>
		<reference ref_id="CVE-2023-21946" ref_url="https://www.suse.com/security/cve/CVE-2023-21946/" source="CVE"/>
		<reference ref_id="CVE-2023-21947" ref_url="https://www.suse.com/security/cve/CVE-2023-21947/" source="CVE"/>
		<reference ref_id="CVE-2023-21953" ref_url="https://www.suse.com/security/cve/CVE-2023-21953/" source="CVE"/>
		<reference ref_id="CVE-2023-21955" ref_url="https://www.suse.com/security/cve/CVE-2023-21955/" source="CVE"/>
		<reference ref_id="CVE-2023-21962" ref_url="https://www.suse.com/security/cve/CVE-2023-21962/" source="CVE"/>
		<reference ref_id="CVE-2023-21966" ref_url="https://www.suse.com/security/cve/CVE-2023-21966/" source="CVE"/>
		<reference ref_id="CVE-2023-21972" ref_url="https://www.suse.com/security/cve/CVE-2023-21972/" source="CVE"/>
		<reference ref_id="CVE-2023-21976" ref_url="https://www.suse.com/security/cve/CVE-2023-21976/" source="CVE"/>
		<reference ref_id="CVE-2023-21977" ref_url="https://www.suse.com/security/cve/CVE-2023-21977/" source="CVE"/>
		<reference ref_id="CVE-2023-21980" ref_url="https://www.suse.com/security/cve/CVE-2023-21980/" source="CVE"/>
		<reference ref_id="CVE-2023-21982" ref_url="https://www.suse.com/security/cve/CVE-2023-21982/" source="CVE"/>
		<reference ref_id="CVE-2023-22005" ref_url="https://www.suse.com/security/cve/CVE-2023-22005/" source="CVE"/>
		<reference ref_id="CVE-2023-22007" ref_url="https://www.suse.com/security/cve/CVE-2023-22007/" source="CVE"/>
		<reference ref_id="CVE-2023-22008" ref_url="https://www.suse.com/security/cve/CVE-2023-22008/" source="CVE"/>
		<reference ref_id="CVE-2023-22032" ref_url="https://www.suse.com/security/cve/CVE-2023-22032/" source="CVE"/>
		<reference ref_id="CVE-2023-22033" ref_url="https://www.suse.com/security/cve/CVE-2023-22033/" source="CVE"/>
		<reference ref_id="CVE-2023-22038" ref_url="https://www.suse.com/security/cve/CVE-2023-22038/" source="CVE"/>
		<reference ref_id="CVE-2023-22046" ref_url="https://www.suse.com/security/cve/CVE-2023-22046/" source="CVE"/>
		<reference ref_id="CVE-2023-22048" ref_url="https://www.suse.com/security/cve/CVE-2023-22048/" source="CVE"/>
		<reference ref_id="CVE-2023-22053" ref_url="https://www.suse.com/security/cve/CVE-2023-22053/" source="CVE"/>
		<reference ref_id="CVE-2023-22054" ref_url="https://www.suse.com/security/cve/CVE-2023-22054/" source="CVE"/>
		<reference ref_id="CVE-2023-22056" ref_url="https://www.suse.com/security/cve/CVE-2023-22056/" source="CVE"/>
		<reference ref_id="CVE-2023-22057" ref_url="https://www.suse.com/security/cve/CVE-2023-22057/" source="CVE"/>
		<reference ref_id="CVE-2023-22058" ref_url="https://www.suse.com/security/cve/CVE-2023-22058/" source="CVE"/>
		<reference ref_id="CVE-2023-22059" ref_url="https://www.suse.com/security/cve/CVE-2023-22059/" source="CVE"/>
		<reference ref_id="CVE-2023-22064" ref_url="https://www.suse.com/security/cve/CVE-2023-22064/" source="CVE"/>
		<reference ref_id="CVE-2023-22065" ref_url="https://www.suse.com/security/cve/CVE-2023-22065/" source="CVE"/>
		<reference ref_id="CVE-2023-22066" ref_url="https://www.suse.com/security/cve/CVE-2023-22066/" source="CVE"/>
		<reference ref_id="CVE-2023-22068" ref_url="https://www.suse.com/security/cve/CVE-2023-22068/" source="CVE"/>
		<reference ref_id="CVE-2023-22070" ref_url="https://www.suse.com/security/cve/CVE-2023-22070/" source="CVE"/>
		<reference ref_id="CVE-2023-22078" ref_url="https://www.suse.com/security/cve/CVE-2023-22078/" source="CVE"/>
		<reference ref_id="CVE-2023-22079" ref_url="https://www.suse.com/security/cve/CVE-2023-22079/" source="CVE"/>
		<reference ref_id="CVE-2023-22084" ref_url="https://www.suse.com/security/cve/CVE-2023-22084/" source="CVE"/>
		<reference ref_id="CVE-2023-22092" ref_url="https://www.suse.com/security/cve/CVE-2023-22092/" source="CVE"/>
		<reference ref_id="CVE-2023-22097" ref_url="https://www.suse.com/security/cve/CVE-2023-22097/" source="CVE"/>
		<reference ref_id="CVE-2023-22103" ref_url="https://www.suse.com/security/cve/CVE-2023-22103/" source="CVE"/>
		<reference ref_id="CVE-2023-22104" ref_url="https://www.suse.com/security/cve/CVE-2023-22104/" source="CVE"/>
		<reference ref_id="CVE-2023-22110" ref_url="https://www.suse.com/security/cve/CVE-2023-22110/" source="CVE"/>
		<reference ref_id="CVE-2023-22111" ref_url="https://www.suse.com/security/cve/CVE-2023-22111/" source="CVE"/>
		<reference ref_id="CVE-2023-22112" ref_url="https://www.suse.com/security/cve/CVE-2023-22112/" source="CVE"/>
		<reference ref_id="CVE-2023-22113" ref_url="https://www.suse.com/security/cve/CVE-2023-22113/" source="CVE"/>
		<reference ref_id="CVE-2023-22114" ref_url="https://www.suse.com/security/cve/CVE-2023-22114/" source="CVE"/>
		<reference ref_id="CVE-2023-22115" ref_url="https://www.suse.com/security/cve/CVE-2023-22115/" source="CVE"/>
		<reference ref_id="CVE-2024-20960" ref_url="https://www.suse.com/security/cve/CVE-2024-20960/" source="CVE"/>
		<reference ref_id="CVE-2024-20961" ref_url="https://www.suse.com/security/cve/CVE-2024-20961/" source="CVE"/>
		<reference ref_id="CVE-2024-20962" ref_url="https://www.suse.com/security/cve/CVE-2024-20962/" source="CVE"/>
		<reference ref_id="CVE-2024-20963" ref_url="https://www.suse.com/security/cve/CVE-2024-20963/" source="CVE"/>
		<reference ref_id="CVE-2024-20964" ref_url="https://www.suse.com/security/cve/CVE-2024-20964/" source="CVE"/>
		<reference ref_id="CVE-2024-20965" ref_url="https://www.suse.com/security/cve/CVE-2024-20965/" source="CVE"/>
		<reference ref_id="CVE-2024-20966" ref_url="https://www.suse.com/security/cve/CVE-2024-20966/" source="CVE"/>
		<reference ref_id="CVE-2024-20967" ref_url="https://www.suse.com/security/cve/CVE-2024-20967/" source="CVE"/>
		<reference ref_id="CVE-2024-20968" ref_url="https://www.suse.com/security/cve/CVE-2024-20968/" source="CVE"/>
		<reference ref_id="CVE-2024-20969" ref_url="https://www.suse.com/security/cve/CVE-2024-20969/" source="CVE"/>
		<reference ref_id="CVE-2024-20970" ref_url="https://www.suse.com/security/cve/CVE-2024-20970/" source="CVE"/>
		<reference ref_id="CVE-2024-20971" ref_url="https://www.suse.com/security/cve/CVE-2024-20971/" source="CVE"/>
		<reference ref_id="CVE-2024-20972" ref_url="https://www.suse.com/security/cve/CVE-2024-20972/" source="CVE"/>
		<reference ref_id="CVE-2024-20973" ref_url="https://www.suse.com/security/cve/CVE-2024-20973/" source="CVE"/>
		<reference ref_id="CVE-2024-20974" ref_url="https://www.suse.com/security/cve/CVE-2024-20974/" source="CVE"/>
		<reference ref_id="CVE-2024-20976" ref_url="https://www.suse.com/security/cve/CVE-2024-20976/" source="CVE"/>
		<reference ref_id="CVE-2024-20977" ref_url="https://www.suse.com/security/cve/CVE-2024-20977/" source="CVE"/>
		<reference ref_id="CVE-2024-20978" ref_url="https://www.suse.com/security/cve/CVE-2024-20978/" source="CVE"/>
		<reference ref_id="CVE-2024-20981" ref_url="https://www.suse.com/security/cve/CVE-2024-20981/" source="CVE"/>
		<reference ref_id="CVE-2024-20982" ref_url="https://www.suse.com/security/cve/CVE-2024-20982/" source="CVE"/>
		<reference ref_id="CVE-2024-20983" ref_url="https://www.suse.com/security/cve/CVE-2024-20983/" source="CVE"/>
		<reference ref_id="CVE-2024-20984" ref_url="https://www.suse.com/security/cve/CVE-2024-20984/" source="CVE"/>
		<reference ref_id="CVE-2024-20985" ref_url="https://www.suse.com/security/cve/CVE-2024-20985/" source="CVE"/>
		<reference ref_id="CVE-2024-20993" ref_url="https://www.suse.com/security/cve/CVE-2024-20993/" source="CVE"/>
		<reference ref_id="CVE-2024-21049" ref_url="https://www.suse.com/security/cve/CVE-2024-21049/" source="CVE"/>
		<reference ref_id="CVE-2024-21050" ref_url="https://www.suse.com/security/cve/CVE-2024-21050/" source="CVE"/>
		<reference ref_id="CVE-2024-21051" ref_url="https://www.suse.com/security/cve/CVE-2024-21051/" source="CVE"/>
		<reference ref_id="CVE-2024-21052" ref_url="https://www.suse.com/security/cve/CVE-2024-21052/" source="CVE"/>
		<reference ref_id="CVE-2024-21053" ref_url="https://www.suse.com/security/cve/CVE-2024-21053/" source="CVE"/>
		<reference ref_id="CVE-2024-21055" ref_url="https://www.suse.com/security/cve/CVE-2024-21055/" source="CVE"/>
		<reference ref_id="CVE-2024-21056" ref_url="https://www.suse.com/security/cve/CVE-2024-21056/" source="CVE"/>
		<reference ref_id="CVE-2024-21057" ref_url="https://www.suse.com/security/cve/CVE-2024-21057/" source="CVE"/>
		<reference ref_id="CVE-2024-21061" ref_url="https://www.suse.com/security/cve/CVE-2024-21061/" source="CVE"/>
		<reference ref_id="CVE-2024-21137" ref_url="https://www.suse.com/security/cve/CVE-2024-21137/" source="CVE"/>
		<reference ref_id="CVE-2024-21200" ref_url="https://www.suse.com/security/cve/CVE-2024-21200/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1141.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1141.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4899/">CVE-2022-4899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4899">CVE-2022-4899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21911/">CVE-2023-21911 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21911">CVE-2023-21911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21919/">CVE-2023-21919 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21919">CVE-2023-21919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21920/">CVE-2023-21920 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21920">CVE-2023-21920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21929/">CVE-2023-21929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21929">CVE-2023-21929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21933/">CVE-2023-21933 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21933">CVE-2023-21933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21935/">CVE-2023-21935 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21935">CVE-2023-21935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21940/">CVE-2023-21940 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21940">CVE-2023-21940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21945/">CVE-2023-21945 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21945">CVE-2023-21945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21946/">CVE-2023-21946 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21946">CVE-2023-21946 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21947/">CVE-2023-21947 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21947">CVE-2023-21947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21953/">CVE-2023-21953 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21953">CVE-2023-21953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21955/">CVE-2023-21955 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21955">CVE-2023-21955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21962/">CVE-2023-21962 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21962">CVE-2023-21962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21966/">CVE-2023-21966 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21966">CVE-2023-21966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21972/">CVE-2023-21972 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21972">CVE-2023-21972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21976/">CVE-2023-21976 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21976">CVE-2023-21976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21977/">CVE-2023-21977 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21977">CVE-2023-21977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21980/">CVE-2023-21980 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21980">CVE-2023-21980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21982/">CVE-2023-21982 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21982">CVE-2023-21982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22005/">CVE-2023-22005 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22005">CVE-2023-22005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22007/">CVE-2023-22007 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22007">CVE-2023-22007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22008/">CVE-2023-22008 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22008">CVE-2023-22008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22032/">CVE-2023-22032 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22032">CVE-2023-22032 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22033/">CVE-2023-22033 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22033">CVE-2023-22033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22038/">CVE-2023-22038 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22038">CVE-2023-22038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22046/">CVE-2023-22046 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22046">CVE-2023-22046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22048/">CVE-2023-22048 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22048">CVE-2023-22048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22053/">CVE-2023-22053 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22053">CVE-2023-22053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22054/">CVE-2023-22054 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22054">CVE-2023-22054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22056/">CVE-2023-22056 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22056">CVE-2023-22056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22057/">CVE-2023-22057 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22057">CVE-2023-22057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22058/">CVE-2023-22058 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22058">CVE-2023-22058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22059/">CVE-2023-22059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22059">CVE-2023-22059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22064/">CVE-2023-22064 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22064">CVE-2023-22064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22065/">CVE-2023-22065 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22065">CVE-2023-22065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22066/">CVE-2023-22066 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22066">CVE-2023-22066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22068/">CVE-2023-22068 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22068">CVE-2023-22068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22070/">CVE-2023-22070 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22070">CVE-2023-22070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22078/">CVE-2023-22078 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22078">CVE-2023-22078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22079/">CVE-2023-22079 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22079">CVE-2023-22079 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22084/">CVE-2023-22084 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22084">CVE-2023-22084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22092/">CVE-2023-22092 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22092">CVE-2023-22092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22097/">CVE-2023-22097 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22097">CVE-2023-22097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22103/">CVE-2023-22103 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22103">CVE-2023-22103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22104/">CVE-2023-22104 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22104">CVE-2023-22104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22110/">CVE-2023-22110 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22110">CVE-2023-22110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22111/">CVE-2023-22111 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22111">CVE-2023-22111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22112/">CVE-2023-22112 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22112">CVE-2023-22112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22113/">CVE-2023-22113 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22113">CVE-2023-22113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22114/">CVE-2023-22114 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22114">CVE-2023-22114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22115/">CVE-2023-22115 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22115">CVE-2023-22115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20960/">CVE-2024-20960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20960">CVE-2024-20960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20961/">CVE-2024-20961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20961">CVE-2024-20961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20962/">CVE-2024-20962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20962">CVE-2024-20962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20963/">CVE-2024-20963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20963">CVE-2024-20963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20964/">CVE-2024-20964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20964">CVE-2024-20964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20965/">CVE-2024-20965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20965">CVE-2024-20965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20966/">CVE-2024-20966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20966">CVE-2024-20966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20967/">CVE-2024-20967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20967">CVE-2024-20967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20968/">CVE-2024-20968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20968">CVE-2024-20968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20969/">CVE-2024-20969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20969">CVE-2024-20969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20970/">CVE-2024-20970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20970">CVE-2024-20970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20971/">CVE-2024-20971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20971">CVE-2024-20971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20972/">CVE-2024-20972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20972">CVE-2024-20972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20973/">CVE-2024-20973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20973">CVE-2024-20973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20974/">CVE-2024-20974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20974">CVE-2024-20974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20976/">CVE-2024-20976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20976">CVE-2024-20976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20977/">CVE-2024-20977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20977">CVE-2024-20977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20978/">CVE-2024-20978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20978">CVE-2024-20978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20981/">CVE-2024-20981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20981">CVE-2024-20981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20982/">CVE-2024-20982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20982">CVE-2024-20982 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20983/">CVE-2024-20983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20983">CVE-2024-20983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20984/">CVE-2024-20984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20984">CVE-2024-20984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20985/">CVE-2024-20985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20985">CVE-2024-20985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20993/">CVE-2024-20993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20993">CVE-2024-20993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21049/">CVE-2024-21049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21049">CVE-2024-21049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21050/">CVE-2024-21050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21050">CVE-2024-21050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21051/">CVE-2024-21051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21051">CVE-2024-21051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21052/">CVE-2024-21052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21052">CVE-2024-21052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21053/">CVE-2024-21053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21053">CVE-2024-21053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21055/">CVE-2024-21055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21055">CVE-2024-21055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21056/">CVE-2024-21056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21056">CVE-2024-21056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21057/">CVE-2024-21057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21057">CVE-2024-21057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21061/">CVE-2024-21061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21061">CVE-2024-21061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21137/">CVE-2024-21137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21137">CVE-2024-21137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21200/">CVE-2024-21200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21200">CVE-2024-21200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4126" version="1" class="patch">
	<metadata>
		<title>security update for haproxy (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-40225" ref_url="https://www.suse.com/security/cve/CVE-2023-40225/" source="CVE"/>
		<reference ref_id="CVE-2023-45539" ref_url="https://www.suse.com/security/cve/CVE-2023-45539/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1142.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1142.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40225/">CVE-2023-40225 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40225">CVE-2023-40225 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45539/">CVE-2023-45539 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45539">CVE-2023-45539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850289" comment="haproxy-2.4.22-3.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4127" version="1" class="patch">
	<metadata>
		<title>security update for rear (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-23301" ref_url="https://www.suse.com/security/cve/CVE-2024-23301/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1147.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1147.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23301/">CVE-2024-23301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23301">CVE-2024-23301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850290" comment="rear-2.6-21.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4128" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1149.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1149.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850291" comment="skopeo-1.13.3-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850292" comment="skopeo-tests-1.13.3-4.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4129" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1150.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1150.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850293" comment="buildah-1.31.4-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850294" comment="buildah-tests-1.31.4-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4130" version="1" class="patch">
	<metadata>
		<title>security update for opencryptoki (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-0914" ref_url="https://www.suse.com/security/cve/CVE-2024-0914/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1239.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1239.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0914/">CVE-2024-0914 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0914">CVE-2024-0914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851389" comment="opencryptoki-3.21.0-9.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851390" comment="opencryptoki-devel-3.21.0-9.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851391" comment="opencryptoki-icsftok-3.21.0-9.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851392" comment="opencryptoki-libs-3.21.0-9.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851393" comment="opencryptoki-swtok-3.21.0-9.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4131" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4244" ref_url="https://www.suse.com/security/cve/CVE-2023-4244/" source="CVE"/>
		<reference ref_id="CVE-2023-51042" ref_url="https://www.suse.com/security/cve/CVE-2023-51042/" source="CVE"/>
		<reference ref_id="CVE-2023-5717" ref_url="https://www.suse.com/security/cve/CVE-2023-5717/" source="CVE"/>
		<reference ref_id="CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606/" source="CVE"/>
		<reference ref_id="CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610/" source="CVE"/>
		<reference ref_id="CVE-2023-6817" ref_url="https://www.suse.com/security/cve/CVE-2023-6817/" source="CVE"/>
		<reference ref_id="CVE-2024-0193" ref_url="https://www.suse.com/security/cve/CVE-2024-0193/" source="CVE"/>
		<reference ref_id="CVE-2024-0646" ref_url="https://www.suse.com/security/cve/CVE-2024-0646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1248.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1248.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4244/">CVE-2023-4244 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51042/">CVE-2023-51042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5717/">CVE-2023-5717 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6817/">CVE-2023-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0193/">CVE-2024-0193 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0193">CVE-2024-0193 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0646/">CVE-2024-0646 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0646">CVE-2024-0646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851394" comment="bpftool-7.2.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851395" comment="kernel-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851396" comment="kernel-abi-stablelists-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851397" comment="kernel-core-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851398" comment="kernel-cross-headers-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851399" comment="kernel-debug-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851400" comment="kernel-debug-core-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851403" comment="kernel-debug-modules-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851404" comment="kernel-debug-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851405" comment="kernel-debug-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851406" comment="kernel-debug-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851409" comment="kernel-doc-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851410" comment="kernel-headers-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851411" comment="kernel-modules-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851412" comment="kernel-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851413" comment="kernel-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851414" comment="kernel-tools-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851415" comment="kernel-tools-libs-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851417" comment="kernel-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851418" comment="libperf-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851419" comment="perf-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851420" comment="python3-perf-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851421" comment="rtla-5.14.0-362.24.1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851422" comment="rv-5.14.0-362.24.1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4132" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21392" ref_url="https://www.suse.com/security/cve/CVE-2024-21392/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1309.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1309.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21392/">CVE-2024-21392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21392">CVE-2024-21392 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872225" comment="aspnetcore-runtime-7.0-7.0.17-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872226" comment="aspnetcore-targeting-pack-7.0-7.0.17-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872227" comment="dotnet-apphost-pack-7.0-7.0.17-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872228" comment="dotnet-hostfxr-7.0-7.0.17-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872229" comment="dotnet-runtime-7.0-7.0.17-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872230" comment="dotnet-sdk-7.0-7.0.117-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872231" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872232" comment="dotnet-targeting-pack-7.0-7.0.17-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872233" comment="dotnet-templates-7.0-7.0.117-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4133" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21392" ref_url="https://www.suse.com/security/cve/CVE-2024-21392/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1310.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1310.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21392/">CVE-2024-21392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21392">CVE-2024-21392 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872234" comment="aspnetcore-runtime-8.0-8.0.3-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872235" comment="aspnetcore-runtime-dbg-8.0-8.0.3-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872236" comment="aspnetcore-targeting-pack-8.0-8.0.3-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872237" comment="dotnet-apphost-pack-8.0-8.0.3-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872238" comment="dotnet-host-8.0.3-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872239" comment="dotnet-hostfxr-8.0-8.0.3-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872240" comment="dotnet-runtime-8.0-8.0.3-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872241" comment="dotnet-runtime-dbg-8.0-8.0.3-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872242" comment="dotnet-sdk-8.0-8.0.103-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872243" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872244" comment="dotnet-sdk-dbg-8.0-8.0.103-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872245" comment="dotnet-targeting-pack-8.0-8.0.3-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872246" comment="dotnet-templates-8.0-8.0.103-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872247" comment="netstandard-targeting-pack-2.1-8.0.103-2.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4134" version="1" class="patch">
	<metadata>
		<title>security update for dnsmasq (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1334.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1334.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851423" comment="dnsmasq-2.85-14.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851424" comment="dnsmasq-utils-2.85-14.el9_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4135" version="1" class="patch">
	<metadata>
		<title>security update for squid (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-50269" ref_url="https://www.suse.com/security/cve/CVE-2023-50269/" source="CVE"/>
		<reference ref_id="CVE-2024-25111" ref_url="https://www.suse.com/security/cve/CVE-2024-25111/" source="CVE"/>
		<reference ref_id="CVE-2024-25617" ref_url="https://www.suse.com/security/cve/CVE-2024-25617/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1376.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1376.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50269/">CVE-2023-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50269">CVE-2023-50269 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25111/">CVE-2024-25111 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25111">CVE-2024-25111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25617/">CVE-2024-25617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25617">CVE-2024-25617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851786" comment="squid-5.5-6.el9_3.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4136" version="1" class="patch">
	<metadata>
		<title>security update for postgresql-jdbc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1597" ref_url="https://www.suse.com/security/cve/CVE-2024-1597/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1436.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1436.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1597/">CVE-2024-1597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1597">CVE-2024-1597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851819" comment="postgresql-jdbc-42.2.28-1.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4137" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-22019" ref_url="https://www.suse.com/security/cve/CVE-2024-22019/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1438.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1438.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22019/">CVE-2024-22019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22019">CVE-2024-22019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851938" comment="nodejs-16.20.2-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851939" comment="nodejs-docs-16.20.2-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851940" comment="nodejs-full-i18n-16.20.2-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851941" comment="nodejs-libs-16.20.2-4.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851942" comment="npm-8.19.4-1.16.20.2.4.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4138" version="1" class="patch">
	<metadata>
		<title>security update for golang (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1462.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1462.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851820" comment="go-toolset-1.20.12-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851821" comment="golang-1.20.12-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851822" comment="golang-bin-1.20.12-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851823" comment="golang-docs-1.20.12-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851824" comment="golang-misc-1.20.12-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851825" comment="golang-src-1.20.12-2.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851826" comment="golang-tests-1.20.12-2.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4139" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743/" source="CVE"/>
		<reference ref_id="CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607/" source="CVE"/>
		<reference ref_id="CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608/" source="CVE"/>
		<reference ref_id="CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610/" source="CVE"/>
		<reference ref_id="CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611/" source="CVE"/>
		<reference ref_id="CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612/" source="CVE"/>
		<reference ref_id="CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614/" source="CVE"/>
		<reference ref_id="CVE-2024-2616" ref_url="https://www.suse.com/security/cve/CVE-2024-2616/" source="CVE"/>
		<reference ref_id="CVE-2024-29944" ref_url="https://www.suse.com/security/cve/CVE-2024-29944/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1485.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1485.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-2616/">CVE-2024-2616 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2616">CVE-2024-2616 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-29944/">CVE-2024-29944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29944">CVE-2024-29944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851986" comment="firefox-115.9.1-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851987" comment="firefox-x11-115.9.1-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4140" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743/" source="CVE"/>
		<reference ref_id="CVE-2024-1936" ref_url="https://www.suse.com/security/cve/CVE-2024-1936/" source="CVE"/>
		<reference ref_id="CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607/" source="CVE"/>
		<reference ref_id="CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608/" source="CVE"/>
		<reference ref_id="CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610/" source="CVE"/>
		<reference ref_id="CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611/" source="CVE"/>
		<reference ref_id="CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612/" source="CVE"/>
		<reference ref_id="CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1493.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1493.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1936/">CVE-2024-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1936">CVE-2024-1936 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851988" comment="thunderbird-115.9.0-1.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4141" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1501.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1501.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851977" comment="grafana-9.2.10-8.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4142" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1502.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1502.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851978" comment="grafana-pcp-5.1.1-2.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4143" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-46809" ref_url="https://www.suse.com/security/cve/CVE-2023-46809/" source="CVE"/>
		<reference ref_id="CVE-2024-21892" ref_url="https://www.suse.com/security/cve/CVE-2024-21892/" source="CVE"/>
		<reference ref_id="CVE-2024-22019" ref_url="https://www.suse.com/security/cve/CVE-2024-22019/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1503.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1503.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46809/">CVE-2023-46809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46809">CVE-2023-46809 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21892/">CVE-2024-21892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21892">CVE-2024-21892 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22019/">CVE-2024-22019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22019">CVE-2024-22019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851979" comment="nodejs-18.19.1-1.module+el9.3.0+21388+22892fb9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851980" comment="nodejs-devel-18.19.1-1.module+el9.3.0+21388+22892fb9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851981" comment="nodejs-docs-18.19.1-1.module+el9.3.0+21388+22892fb9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851982" comment="nodejs-full-i18n-18.19.1-1.module+el9.3.0+21388+22892fb9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851983" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0+19762+d716bf3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851984" comment="npm-10.2.4-1.18.19.1.1.module+el9.3.0+21388+22892fb9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4144" version="1" class="patch">
	<metadata>
		<title>security update for expat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-28757" ref_url="https://www.suse.com/security/cve/CVE-2024-28757/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1530.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1530.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28757/">CVE-2024-28757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851989" comment="expat-2.5.0-1.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851990" comment="expat-devel-2.5.0-1.el9_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4145" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-33621" ref_url="https://www.suse.com/security/cve/CVE-2021-33621/" source="CVE"/>
		<reference ref_id="CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755/" source="CVE"/>
		<reference ref_id="CVE-2023-28756" ref_url="https://www.suse.com/security/cve/CVE-2023-28756/" source="CVE"/>
		<reference ref_id="CVE-2023-36617" ref_url="https://www.suse.com/security/cve/CVE-2023-36617/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1576.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1576.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33621/">CVE-2021-33621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33621">CVE-2021-33621 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28756/">CVE-2023-28756 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28756">CVE-2023-28756 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36617/">CVE-2023-36617 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36617">CVE-2023-36617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872248" comment="ruby-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872249" comment="ruby-bundled-gems-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872250" comment="ruby-default-gems-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872251" comment="ruby-devel-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872252" comment="ruby-doc-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872253" comment="ruby-libs-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872254" comment="rubygem-bigdecimal-3.1.1-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872255" comment="rubygem-bundler-2.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872256" comment="rubygem-io-console-0.5.11-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872257" comment="rubygem-irb-1.4.1-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872258" comment="rubygem-json-2.6.1-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872259" comment="rubygem-minitest-5.15.0-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872260" comment="rubygem-mysql2-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872261" comment="rubygem-mysql2-doc-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872262" comment="rubygem-pg-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872263" comment="rubygem-pg-doc-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872264" comment="rubygem-power_assert-2.0.1-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872265" comment="rubygem-psych-4.0.4-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872266" comment="rubygem-rake-13.0.6-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872267" comment="rubygem-rbs-2.7.0-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872268" comment="rubygem-rdoc-6.4.0-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872269" comment="rubygem-rexml-3.2.5-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872270" comment="rubygem-rss-0.2.9-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872271" comment="rubygem-test-unit-3.5.3-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872272" comment="rubygem-typeprof-0.21.3-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872273" comment="rubygems-3.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872274" comment="rubygems-devel-3.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4146" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-46809" ref_url="https://www.suse.com/security/cve/CVE-2023-46809/" source="CVE"/>
		<reference ref_id="CVE-2024-21890" ref_url="https://www.suse.com/security/cve/CVE-2024-21890/" source="CVE"/>
		<reference ref_id="CVE-2024-21891" ref_url="https://www.suse.com/security/cve/CVE-2024-21891/" source="CVE"/>
		<reference ref_id="CVE-2024-21892" ref_url="https://www.suse.com/security/cve/CVE-2024-21892/" source="CVE"/>
		<reference ref_id="CVE-2024-21896" ref_url="https://www.suse.com/security/cve/CVE-2024-21896/" source="CVE"/>
		<reference ref_id="CVE-2024-22017" ref_url="https://www.suse.com/security/cve/CVE-2024-22017/" source="CVE"/>
		<reference ref_id="CVE-2024-22019" ref_url="https://www.suse.com/security/cve/CVE-2024-22019/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1688.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1688.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46809/">CVE-2023-46809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46809">CVE-2023-46809 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21890/">CVE-2024-21890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21890">CVE-2024-21890 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21891/">CVE-2024-21891 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21891">CVE-2024-21891 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21892/">CVE-2024-21892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21892">CVE-2024-21892 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21896/">CVE-2024-21896 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21896">CVE-2024-21896 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22017/">CVE-2024-22017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22017">CVE-2024-22017 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22019/">CVE-2024-22019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22019">CVE-2024-22019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853717" comment="nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853718" comment="nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853719" comment="nodejs-docs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853720" comment="nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853724" comment="npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4147" version="1" class="patch">
	<metadata>
		<title>security update for varnish (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-30156" ref_url="https://www.suse.com/security/cve/CVE-2024-30156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1691.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1691.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30156/">CVE-2024-30156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30156">CVE-2024-30156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853725" comment="varnish-6.6.2-4.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853726" comment="varnish-devel-6.6.2-4.el9_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853727" comment="varnish-docs-6.6.2-4.el9_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4148" version="1" class="patch">
	<metadata>
		<title>security update for less (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-48624" ref_url="https://www.suse.com/security/cve/CVE-2022-48624/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1692.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1692.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48624/">CVE-2022-48624 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48624">CVE-2022-48624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853728" comment="less-590-3.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4149" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1488" ref_url="https://www.suse.com/security/cve/CVE-2024-1488/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1750.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1750.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1488/">CVE-2024-1488 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1488">CVE-2024-1488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854107" comment="python3-unbound-1.16.2-3.el9_3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854108" comment="unbound-1.16.2-3.el9_3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854109" comment="unbound-devel-1.16.2-3.el9_3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854110" comment="unbound-libs-1.16.2-3.el9_3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4150" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4408" ref_url="https://www.suse.com/security/cve/CVE-2023-4408/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<reference ref_id="CVE-2023-5517" ref_url="https://www.suse.com/security/cve/CVE-2023-5517/" source="CVE"/>
		<reference ref_id="CVE-2023-5679" ref_url="https://www.suse.com/security/cve/CVE-2023-5679/" source="CVE"/>
		<reference ref_id="CVE-2023-6516" ref_url="https://www.suse.com/security/cve/CVE-2023-6516/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1789.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1789.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4408/">CVE-2023-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4408">CVE-2023-4408 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5517/">CVE-2023-5517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5517">CVE-2023-5517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5679/">CVE-2023-5679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5679">CVE-2023-5679 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6516/">CVE-2023-6516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6516">CVE-2023-6516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854679" comment="bind-9.16.23-14.el9_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854680" comment="bind-chroot-9.16.23-14.el9_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854681" comment="bind-devel-9.16.23-14.el9_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854682" comment="bind-dnssec-doc-9.16.23-14.el9_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854683" comment="bind-dnssec-utils-9.16.23-14.el9_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854684" comment="bind-doc-9.16.23-14.el9_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854685" comment="bind-dyndb-ldap-11.9-8.el9_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854686" comment="bind-libs-9.16.23-14.el9_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854687" comment="bind-license-9.16.23-14.el9_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854688" comment="bind-utils-9.16.23-14.el9_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854689" comment="python3-bind-9.16.23-14.el9_3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4151" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1818.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1818.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858428" comment="java-1.8.0-openjdk-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858429" comment="java-1.8.0-openjdk-accessibility-1.8.0.412.b08-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859962" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.412.b08-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859963" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.412.b08-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858430" comment="java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858431" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858432" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858433" comment="java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858434" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858435" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858436" comment="java-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858437" comment="java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858438" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858439" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858440" comment="java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858441" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858442" comment="java-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858443" comment="java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858444" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858445" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4152" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1822.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1822.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009856130" comment="java-11-openjdk-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856131" comment="java-11-openjdk-demo-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856132" comment="java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856133" comment="java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856134" comment="java-11-openjdk-devel-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856135" comment="java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856136" comment="java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856137" comment="java-11-openjdk-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856138" comment="java-11-openjdk-headless-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856139" comment="java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856140" comment="java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856141" comment="java-11-openjdk-javadoc-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856142" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856143" comment="java-11-openjdk-jmods-11.0.23.0.9-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856144" comment="java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856145" comment="java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856146" comment="java-11-openjdk-slowdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856147" comment="java-11-openjdk-src-11.0.23.0.9-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856148" comment="java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856149" comment="java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856150" comment="java-11-openjdk-static-libs-11.0.23.0.9-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856151" comment="java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856152" comment="java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4153" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1825.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1825.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855576" comment="java-17-openjdk-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855577" comment="java-17-openjdk-demo-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855578" comment="java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855579" comment="java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855580" comment="java-17-openjdk-devel-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855581" comment="java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855582" comment="java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855583" comment="java-17-openjdk-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855584" comment="java-17-openjdk-headless-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855585" comment="java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855586" comment="java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855587" comment="java-17-openjdk-javadoc-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855588" comment="java-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855589" comment="java-17-openjdk-jmods-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855590" comment="java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855591" comment="java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855592" comment="java-17-openjdk-slowdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855593" comment="java-17-openjdk-src-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855594" comment="java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855595" comment="java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855596" comment="java-17-openjdk-static-libs-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855597" comment="java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855598" comment="java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4154" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1828.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1828.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855697" comment="java-21-openjdk-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855698" comment="java-21-openjdk-demo-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855699" comment="java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855700" comment="java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855701" comment="java-21-openjdk-devel-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855702" comment="java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855703" comment="java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855704" comment="java-21-openjdk-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855705" comment="java-21-openjdk-headless-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855706" comment="java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855707" comment="java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855708" comment="java-21-openjdk-javadoc-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855709" comment="java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855710" comment="java-21-openjdk-jmods-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855711" comment="java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855712" comment="java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855713" comment="java-21-openjdk-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855714" comment="java-21-openjdk-src-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855715" comment="java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855716" comment="java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855717" comment="java-21-openjdk-static-libs-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855718" comment="java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855719" comment="java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4155" version="1" class="patch">
	<metadata>
		<title>security update for mod_http2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-27316" ref_url="https://www.suse.com/security/cve/CVE-2024-27316/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1872.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1872.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27316/">CVE-2024-27316 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27316">CVE-2024-27316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855310" comment="mod_http2-1.15.19-5.el9_3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4156" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-28834" ref_url="https://www.suse.com/security/cve/CVE-2024-28834/" source="CVE"/>
		<reference ref_id="CVE-2024-28835" ref_url="https://www.suse.com/security/cve/CVE-2024-28835/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1879.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1879.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28834/">CVE-2024-28834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28835/">CVE-2024-28835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28835">CVE-2024-28835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855311" comment="gnutls-3.7.6-23.el9_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855312" comment="gnutls-c++-3.7.6-23.el9_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855313" comment="gnutls-dane-3.7.6-23.el9_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855314" comment="gnutls-devel-3.7.6-23.el9_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855315" comment="gnutls-utils-3.7.6-23.el9_3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4157" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609/" source="CVE"/>
		<reference ref_id="CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302/" source="CVE"/>
		<reference ref_id="CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852/" source="CVE"/>
		<reference ref_id="CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854/" source="CVE"/>
		<reference ref_id="CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857/" source="CVE"/>
		<reference ref_id="CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859/" source="CVE"/>
		<reference ref_id="CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861/" source="CVE"/>
		<reference ref_id="CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1908.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1908.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009856159" comment="firefox-115.10.0-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856160" comment="firefox-x11-115.10.0-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4158" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2357" ref_url="https://www.suse.com/security/cve/CVE-2024-2357/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2033.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2033.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2357/">CVE-2024-2357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2357">CVE-2024-2357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858072" comment="libreswan-4.12-1.el9_3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4159" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2055.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2055.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858073" comment="buildah-1.31.5-1.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858074" comment="buildah-tests-1.31.5-1.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4160" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2079.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2079.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867069" comment="git-lfs-3.2.0-2.el9_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4161" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-25126" ref_url="https://www.suse.com/security/cve/CVE-2024-25126/" source="CVE"/>
		<reference ref_id="CVE-2024-26141" ref_url="https://www.suse.com/security/cve/CVE-2024-26141/" source="CVE"/>
		<reference ref_id="CVE-2024-26146" ref_url="https://www.suse.com/security/cve/CVE-2024-26146/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2113.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2113.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25126/">CVE-2024-25126 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25126">CVE-2024-25126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26141/">CVE-2024-26141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26141">CVE-2024-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26146/">CVE-2024-26146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26146">CVE-2024-26146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866424" comment="pcs-0.11.7-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866425" comment="pcs-snmp-0.11.7-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4162" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2014-1745" ref_url="https://www.suse.com/security/cve/CVE-2014-1745/" source="CVE"/>
		<reference ref_id="CVE-2023-32359" ref_url="https://www.suse.com/security/cve/CVE-2023-32359/" source="CVE"/>
		<reference ref_id="CVE-2023-39928" ref_url="https://www.suse.com/security/cve/CVE-2023-39928/" source="CVE"/>
		<reference ref_id="CVE-2023-40414" ref_url="https://www.suse.com/security/cve/CVE-2023-40414/" source="CVE"/>
		<reference ref_id="CVE-2023-41983" ref_url="https://www.suse.com/security/cve/CVE-2023-41983/" source="CVE"/>
		<reference ref_id="CVE-2023-42852" ref_url="https://www.suse.com/security/cve/CVE-2023-42852/" source="CVE"/>
		<reference ref_id="CVE-2023-42875" ref_url="https://www.suse.com/security/cve/CVE-2023-42875/" source="CVE"/>
		<reference ref_id="CVE-2023-42883" ref_url="https://www.suse.com/security/cve/CVE-2023-42883/" source="CVE"/>
		<reference ref_id="CVE-2023-42890" ref_url="https://www.suse.com/security/cve/CVE-2023-42890/" source="CVE"/>
		<reference ref_id="CVE-2023-42917" ref_url="https://www.suse.com/security/cve/CVE-2023-42917/" source="CVE"/>
		<reference ref_id="CVE-2023-42970" ref_url="https://www.suse.com/security/cve/CVE-2023-42970/" source="CVE"/>
		<reference ref_id="CVE-2023-43000" ref_url="https://www.suse.com/security/cve/CVE-2023-43000/" source="CVE"/>
		<reference ref_id="CVE-2024-23271" ref_url="https://www.suse.com/security/cve/CVE-2024-23271/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2126.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2126.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-1745/">CVE-2014-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1745">CVE-2014-1745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32359/">CVE-2023-32359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32359">CVE-2023-32359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39928/">CVE-2023-39928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39928">CVE-2023-39928 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40414/">CVE-2023-40414 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40414">CVE-2023-40414 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41983/">CVE-2023-41983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41983">CVE-2023-41983 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42852/">CVE-2023-42852 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42852">CVE-2023-42852 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42875/">CVE-2023-42875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42875">CVE-2023-42875 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42883/">CVE-2023-42883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42883">CVE-2023-42883 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42890/">CVE-2023-42890 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42890">CVE-2023-42890 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42917/">CVE-2023-42917 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42917">CVE-2023-42917 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42970/">CVE-2023-42970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42970">CVE-2023-42970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-43000/">CVE-2023-43000 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43000">CVE-2023-43000 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-23271/">CVE-2024-23271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23271">CVE-2024-23271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4163" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<reference ref_id="CVE-2023-52323" ref_url="https://www.suse.com/security/cve/CVE-2023-52323/" source="CVE"/>
		<reference ref_id="CVE-2024-22195" ref_url="https://www.suse.com/security/cve/CVE-2024-22195/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2132.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2132.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52323/">CVE-2023-52323 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52323">CVE-2023-52323 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22195/">CVE-2024-22195 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22195">CVE-2024-22195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866430" comment="fence-agents-aliyun-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866431" comment="fence-agents-all-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866432" comment="fence-agents-amt-ws-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866433" comment="fence-agents-apc-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866434" comment="fence-agents-apc-snmp-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866435" comment="fence-agents-aws-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866436" comment="fence-agents-azure-arm-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866437" comment="fence-agents-bladecenter-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866438" comment="fence-agents-brocade-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866439" comment="fence-agents-cisco-mds-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866440" comment="fence-agents-cisco-ucs-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866441" comment="fence-agents-common-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866442" comment="fence-agents-compute-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866443" comment="fence-agents-drac5-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866444" comment="fence-agents-eaton-snmp-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866445" comment="fence-agents-emerson-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866446" comment="fence-agents-eps-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866447" comment="fence-agents-gce-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866448" comment="fence-agents-heuristics-ping-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866449" comment="fence-agents-hpblade-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866450" comment="fence-agents-ibm-powervs-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866451" comment="fence-agents-ibm-vpc-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866452" comment="fence-agents-ibmblade-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866453" comment="fence-agents-ifmib-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866454" comment="fence-agents-ilo-moonshot-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866455" comment="fence-agents-ilo-mp-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866456" comment="fence-agents-ilo-ssh-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866457" comment="fence-agents-ilo2-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866458" comment="fence-agents-intelmodular-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866459" comment="fence-agents-ipdu-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866460" comment="fence-agents-ipmilan-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866461" comment="fence-agents-kdump-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866462" comment="fence-agents-kubevirt-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866463" comment="fence-agents-mpath-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866464" comment="fence-agents-openstack-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866465" comment="fence-agents-redfish-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866466" comment="fence-agents-rhevm-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866467" comment="fence-agents-rsa-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866468" comment="fence-agents-rsb-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866469" comment="fence-agents-sbd-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866470" comment="fence-agents-scsi-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866471" comment="fence-agents-virsh-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866472" comment="fence-agents-vmware-rest-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866473" comment="fence-agents-vmware-soap-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866474" comment="fence-agents-wti-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866475" comment="fence-virt-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866476" comment="fence-virtd-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866477" comment="fence-virtd-cpg-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866478" comment="fence-virtd-libvirt-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866479" comment="fence-virtd-multicast-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866480" comment="fence-virtd-serial-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866481" comment="fence-virtd-tcp-4.10.0-62.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866482" comment="ha-cloud-support-4.10.0-62.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4164" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-3019" ref_url="https://www.suse.com/security/cve/CVE-2023-3019/" source="CVE"/>
		<reference ref_id="CVE-2023-3255" ref_url="https://www.suse.com/security/cve/CVE-2023-3255/" source="CVE"/>
		<reference ref_id="CVE-2023-42467" ref_url="https://www.suse.com/security/cve/CVE-2023-42467/" source="CVE"/>
		<reference ref_id="CVE-2023-5088" ref_url="https://www.suse.com/security/cve/CVE-2023-5088/" source="CVE"/>
		<reference ref_id="CVE-2023-6683" ref_url="https://www.suse.com/security/cve/CVE-2023-6683/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2135.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2135.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3019/">CVE-2023-3019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3019">CVE-2023-3019 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3255/">CVE-2023-3255 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3255">CVE-2023-3255 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42467/">CVE-2023-42467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42467">CVE-2023-42467 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5088/">CVE-2023-5088 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5088">CVE-2023-5088 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6683/">CVE-2023-6683 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6683">CVE-2023-6683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872275" comment="qemu-guest-agent-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872276" comment="qemu-img-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872277" comment="qemu-kvm-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872278" comment="qemu-kvm-audio-pa-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872279" comment="qemu-kvm-block-blkio-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872280" comment="qemu-kvm-block-curl-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872281" comment="qemu-kvm-block-rbd-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872282" comment="qemu-kvm-common-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872283" comment="qemu-kvm-core-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872284" comment="qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872285" comment="qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872286" comment="qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872287" comment="qemu-kvm-device-usb-host-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872288" comment="qemu-kvm-device-usb-redirect-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872289" comment="qemu-kvm-docs-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872290" comment="qemu-kvm-tools-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872291" comment="qemu-kvm-ui-egl-headless-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872292" comment="qemu-kvm-ui-opengl-8.2.0-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872293" comment="qemu-pr-helper-8.2.0-11.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4165" version="1" class="patch">
	<metadata>
		<title>security update for LibRaw (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-1729" ref_url="https://www.suse.com/security/cve/CVE-2023-1729/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2137.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2137.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1729/">CVE-2023-1729 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1729">CVE-2023-1729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866483" comment="LibRaw-0.21.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866484" comment="LibRaw-devel-0.21.1-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4166" version="1" class="patch">
	<metadata>
		<title>security update for libX11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-43785" ref_url="https://www.suse.com/security/cve/CVE-2023-43785/" source="CVE"/>
		<reference ref_id="CVE-2023-43786" ref_url="https://www.suse.com/security/cve/CVE-2023-43786/" source="CVE"/>
		<reference ref_id="CVE-2023-43787" ref_url="https://www.suse.com/security/cve/CVE-2023-43787/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2145.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2145.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43785/">CVE-2023-43785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43785">CVE-2023-43785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43786/">CVE-2023-43786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43786">CVE-2023-43786 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-43787/">CVE-2023-43787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43787">CVE-2023-43787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866485" comment="libX11-1.7.0-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866486" comment="libX11-common-1.7.0-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866487" comment="libX11-devel-1.7.0-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866488" comment="libX11-xcb-1.7.0-9.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4167" version="1" class="patch">
	<metadata>
		<title>security update for libXpm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-43788" ref_url="https://www.suse.com/security/cve/CVE-2023-43788/" source="CVE"/>
		<reference ref_id="CVE-2023-43789" ref_url="https://www.suse.com/security/cve/CVE-2023-43789/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2146.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2146.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43788/">CVE-2023-43788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43788">CVE-2023-43788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43789/">CVE-2023-43789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43789">CVE-2023-43789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866489" comment="libXpm-3.5.13-10.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866490" comment="libXpm-devel-3.5.13-10.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4168" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1481" ref_url="https://www.suse.com/security/cve/CVE-2024-1481/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2147.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2147.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1481/">CVE-2024-1481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1481">CVE-2024-1481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868940" comment="ipa-client-4.11.0-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868941" comment="ipa-client-common-4.11.0-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868942" comment="ipa-client-epn-4.11.0-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868943" comment="ipa-client-samba-4.11.0-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868944" comment="ipa-common-4.11.0-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868945" comment="ipa-selinux-4.11.0-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868946" comment="ipa-server-4.11.0-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868947" comment="ipa-server-common-4.11.0-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868948" comment="ipa-server-dns-4.11.0-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868949" comment="ipa-server-trust-ad-4.11.0-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868950" comment="python3-ipaclient-4.11.0-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868951" comment="python3-ipalib-4.11.0-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868952" comment="python3-ipaserver-4.11.0-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868953" comment="python3-ipatests-4.11.0-9.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4169" version="1" class="patch">
	<metadata>
		<title>security update for frr (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-31489" ref_url="https://www.suse.com/security/cve/CVE-2023-31489/" source="CVE"/>
		<reference ref_id="CVE-2023-31490" ref_url="https://www.suse.com/security/cve/CVE-2023-31490/" source="CVE"/>
		<reference ref_id="CVE-2023-41358" ref_url="https://www.suse.com/security/cve/CVE-2023-41358/" source="CVE"/>
		<reference ref_id="CVE-2023-41359" ref_url="https://www.suse.com/security/cve/CVE-2023-41359/" source="CVE"/>
		<reference ref_id="CVE-2023-41360" ref_url="https://www.suse.com/security/cve/CVE-2023-41360/" source="CVE"/>
		<reference ref_id="CVE-2023-41909" ref_url="https://www.suse.com/security/cve/CVE-2023-41909/" source="CVE"/>
		<reference ref_id="CVE-2023-46752" ref_url="https://www.suse.com/security/cve/CVE-2023-46752/" source="CVE"/>
		<reference ref_id="CVE-2023-46753" ref_url="https://www.suse.com/security/cve/CVE-2023-46753/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2156.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2156.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31489/">CVE-2023-31489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31489">CVE-2023-31489 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31490/">CVE-2023-31490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31490">CVE-2023-31490 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41358/">CVE-2023-41358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41358">CVE-2023-41358 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41359/">CVE-2023-41359 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41359">CVE-2023-41359 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41360/">CVE-2023-41360 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41360">CVE-2023-41360 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-41909/">CVE-2023-41909 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41909">CVE-2023-41909 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46752/">CVE-2023-46752 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46752">CVE-2023-46752 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46753/">CVE-2023-46753 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46753">CVE-2023-46753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867211" comment="frr-8.5.3-4.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867212" comment="frr-selinux-8.5.3-4.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4170" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-urllib3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2159.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2159.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866491" comment="python3.11-urllib3-1.26.12-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4171" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367/" source="CVE"/>
		<reference ref_id="CVE-2023-5380" ref_url="https://www.suse.com/security/cve/CVE-2023-5380/" source="CVE"/>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478/" source="CVE"/>
		<reference ref_id="CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816/" source="CVE"/>
		<reference ref_id="CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229/" source="CVE"/>
		<reference ref_id="CVE-2024-0408" ref_url="https://www.suse.com/security/cve/CVE-2024-0408/" source="CVE"/>
		<reference ref_id="CVE-2024-0409" ref_url="https://www.suse.com/security/cve/CVE-2024-0409/" source="CVE"/>
		<reference ref_id="CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885/" source="CVE"/>
		<reference ref_id="CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2169.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2169.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5380/">CVE-2023-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5380">CVE-2023-5380 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0408/">CVE-2024-0408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0409/">CVE-2024-0409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866492" comment="xorg-x11-server-Xdmx-1.20.11-24.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866493" comment="xorg-x11-server-Xephyr-1.20.11-24.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866494" comment="xorg-x11-server-Xnest-1.20.11-24.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866495" comment="xorg-x11-server-Xorg-1.20.11-24.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866496" comment="xorg-x11-server-Xvfb-1.20.11-24.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866497" comment="xorg-x11-server-common-1.20.11-24.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866498" comment="xorg-x11-server-devel-1.20.11-24.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866499" comment="xorg-x11-server-source-1.20.11-24.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4172" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server-Xwayland (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367/" source="CVE"/>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478/" source="CVE"/>
		<reference ref_id="CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816/" source="CVE"/>
		<reference ref_id="CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229/" source="CVE"/>
		<reference ref_id="CVE-2024-0408" ref_url="https://www.suse.com/security/cve/CVE-2024-0408/" source="CVE"/>
		<reference ref_id="CVE-2024-0409" ref_url="https://www.suse.com/security/cve/CVE-2024-0409/" source="CVE"/>
		<reference ref_id="CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885/" source="CVE"/>
		<reference ref_id="CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2170.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2170.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0408/">CVE-2024-0408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0409/">CVE-2024-0409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866500" comment="xorg-x11-server-Xwayland-22.1.9-5.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4173" version="1" class="patch">
	<metadata>
		<title>security update for runc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2023-45287" ref_url="https://www.suse.com/security/cve/CVE-2023-45287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2180.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2180.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45287/">CVE-2023-45287 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45287">CVE-2023-45287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871419" comment="runc-1.1.12-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4174" version="1" class="patch">
	<metadata>
		<title>security update for libsndfile (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-33065" ref_url="https://www.suse.com/security/cve/CVE-2022-33065/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2184.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2184.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33065/">CVE-2022-33065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33065">CVE-2022-33065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866501" comment="libsndfile-1.0.31-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866502" comment="libsndfile-devel-1.0.31-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866503" comment="libsndfile-utils-1.0.31-8.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4175" version="1" class="patch">
	<metadata>
		<title>security update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326/" source="CVE"/>
		<reference ref_id="CVE-2023-45287" ref_url="https://www.suse.com/security/cve/CVE-2023-45287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2193.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2193.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45287/">CVE-2023-45287 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45287">CVE-2023-45287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867213" comment="podman-4.9.4-0.1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867214" comment="podman-docker-4.9.4-0.1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867215" comment="podman-plugins-4.9.4-0.1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867216" comment="podman-remote-4.9.4-0.1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867217" comment="podman-tests-4.9.4-0.1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4176" version="1" class="patch">
	<metadata>
		<title>security update for pmix (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-41915" ref_url="https://www.suse.com/security/cve/CVE-2023-41915/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2199.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2199.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-41915/">CVE-2023-41915 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41915">CVE-2023-41915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866504" comment="pmix-3.2.3-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866505" comment="pmix-devel-3.2.3-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866506" comment="pmix-pmi-3.2.3-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866507" comment="pmix-pmi-devel-3.2.3-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866508" comment="pmix-tools-3.2.3-5.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4177" version="1" class="patch">
	<metadata>
		<title>security update for libnbd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5215" ref_url="https://www.suse.com/security/cve/CVE-2023-5215/" source="CVE"/>
		<reference ref_id="CVE-2023-5871" ref_url="https://www.suse.com/security/cve/CVE-2023-5871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2204.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2204.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5215/">CVE-2023-5215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5215">CVE-2023-5215 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5871/">CVE-2023-5871 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5871">CVE-2023-5871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866509" comment="libnbd-1.18.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866510" comment="libnbd-bash-completion-1.18.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866511" comment="libnbd-devel-1.18.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866512" comment="nbdfuse-1.18.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866513" comment="ocaml-libnbd-1.18.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866514" comment="ocaml-libnbd-devel-1.18.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866515" comment="python3-libnbd-1.18.1-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4178" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-39350" ref_url="https://www.suse.com/security/cve/CVE-2023-39350/" source="CVE"/>
		<reference ref_id="CVE-2023-39351" ref_url="https://www.suse.com/security/cve/CVE-2023-39351/" source="CVE"/>
		<reference ref_id="CVE-2023-39352" ref_url="https://www.suse.com/security/cve/CVE-2023-39352/" source="CVE"/>
		<reference ref_id="CVE-2023-39353" ref_url="https://www.suse.com/security/cve/CVE-2023-39353/" source="CVE"/>
		<reference ref_id="CVE-2023-39354" ref_url="https://www.suse.com/security/cve/CVE-2023-39354/" source="CVE"/>
		<reference ref_id="CVE-2023-39356" ref_url="https://www.suse.com/security/cve/CVE-2023-39356/" source="CVE"/>
		<reference ref_id="CVE-2023-40181" ref_url="https://www.suse.com/security/cve/CVE-2023-40181/" source="CVE"/>
		<reference ref_id="CVE-2023-40186" ref_url="https://www.suse.com/security/cve/CVE-2023-40186/" source="CVE"/>
		<reference ref_id="CVE-2023-40188" ref_url="https://www.suse.com/security/cve/CVE-2023-40188/" source="CVE"/>
		<reference ref_id="CVE-2023-40567" ref_url="https://www.suse.com/security/cve/CVE-2023-40567/" source="CVE"/>
		<reference ref_id="CVE-2023-40569" ref_url="https://www.suse.com/security/cve/CVE-2023-40569/" source="CVE"/>
		<reference ref_id="CVE-2023-40589" ref_url="https://www.suse.com/security/cve/CVE-2023-40589/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2208.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2208.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39350/">CVE-2023-39350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39350">CVE-2023-39350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39351/">CVE-2023-39351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39351">CVE-2023-39351 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39352/">CVE-2023-39352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39352">CVE-2023-39352 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39353/">CVE-2023-39353 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39353">CVE-2023-39353 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39354/">CVE-2023-39354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39354">CVE-2023-39354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39356/">CVE-2023-39356 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39356">CVE-2023-39356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40181/">CVE-2023-40181 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40181">CVE-2023-40181 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40186/">CVE-2023-40186 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40186">CVE-2023-40186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40188/">CVE-2023-40188 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40188">CVE-2023-40188 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40567/">CVE-2023-40567 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40567">CVE-2023-40567 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40569/">CVE-2023-40569 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40569">CVE-2023-40569 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40589/">CVE-2023-40589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40589">CVE-2023-40589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866516" comment="freerdp-2.11.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866517" comment="freerdp-devel-2.11.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866518" comment="freerdp-libs-2.11.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866519" comment="libwinpr-2.11.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866520" comment="libwinpr-devel-2.11.2-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4179" version="1" class="patch">
	<metadata>
		<title>security update for tcpdump (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-41043" ref_url="https://www.suse.com/security/cve/CVE-2021-41043/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2211.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2211.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41043/">CVE-2021-41043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41043">CVE-2021-41043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866521" comment="tcpdump-4.99.0-9.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4180" version="1" class="patch">
	<metadata>
		<title>security update for pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-6917" ref_url="https://www.suse.com/security/cve/CVE-2023-6917/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2213.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2213.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6917/">CVE-2023-6917 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6917">CVE-2023-6917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872738" comment="pcp-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872739" comment="pcp-conf-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872740" comment="pcp-devel-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872741" comment="pcp-doc-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872742" comment="pcp-export-pcp2elasticsearch-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872743" comment="pcp-export-pcp2graphite-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872744" comment="pcp-export-pcp2influxdb-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872745" comment="pcp-export-pcp2json-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872746" comment="pcp-export-pcp2spark-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872747" comment="pcp-export-pcp2xml-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872748" comment="pcp-export-pcp2zabbix-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872749" comment="pcp-export-zabbix-agent-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872750" comment="pcp-geolocate-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872751" comment="pcp-gui-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872752" comment="pcp-import-collectl2pcp-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872753" comment="pcp-import-ganglia2pcp-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872754" comment="pcp-import-iostat2pcp-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872755" comment="pcp-import-mrtg2pcp-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872756" comment="pcp-import-sar2pcp-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872757" comment="pcp-libs-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872758" comment="pcp-libs-devel-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872759" comment="pcp-pmda-activemq-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872760" comment="pcp-pmda-apache-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872761" comment="pcp-pmda-bash-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872762" comment="pcp-pmda-bcc-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872763" comment="pcp-pmda-bind2-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872764" comment="pcp-pmda-bonding-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872765" comment="pcp-pmda-bpf-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872766" comment="pcp-pmda-bpftrace-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872767" comment="pcp-pmda-cifs-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872768" comment="pcp-pmda-cisco-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872769" comment="pcp-pmda-dbping-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872770" comment="pcp-pmda-denki-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872771" comment="pcp-pmda-dm-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872772" comment="pcp-pmda-docker-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872773" comment="pcp-pmda-ds389-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872774" comment="pcp-pmda-ds389log-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872775" comment="pcp-pmda-elasticsearch-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872776" comment="pcp-pmda-farm-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872777" comment="pcp-pmda-gfs2-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872778" comment="pcp-pmda-gluster-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872779" comment="pcp-pmda-gpfs-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872780" comment="pcp-pmda-gpsd-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872781" comment="pcp-pmda-hacluster-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872782" comment="pcp-pmda-haproxy-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872783" comment="pcp-pmda-infiniband-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872784" comment="pcp-pmda-json-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872785" comment="pcp-pmda-libvirt-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872786" comment="pcp-pmda-lio-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872787" comment="pcp-pmda-lmsensors-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872788" comment="pcp-pmda-logger-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872789" comment="pcp-pmda-lustre-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872790" comment="pcp-pmda-lustrecomm-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872791" comment="pcp-pmda-mailq-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872792" comment="pcp-pmda-memcache-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872793" comment="pcp-pmda-mic-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872794" comment="pcp-pmda-mongodb-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872795" comment="pcp-pmda-mounts-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872796" comment="pcp-pmda-mssql-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872797" comment="pcp-pmda-mysql-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872798" comment="pcp-pmda-named-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872799" comment="pcp-pmda-netcheck-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872800" comment="pcp-pmda-netfilter-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872801" comment="pcp-pmda-news-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872802" comment="pcp-pmda-nfsclient-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872803" comment="pcp-pmda-nginx-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872804" comment="pcp-pmda-nvidia-gpu-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872805" comment="pcp-pmda-openmetrics-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872806" comment="pcp-pmda-openvswitch-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872807" comment="pcp-pmda-oracle-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872808" comment="pcp-pmda-pdns-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872809" comment="pcp-pmda-perfevent-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872810" comment="pcp-pmda-podman-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872811" comment="pcp-pmda-postfix-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872812" comment="pcp-pmda-postgresql-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872813" comment="pcp-pmda-rabbitmq-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872814" comment="pcp-pmda-redis-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872815" comment="pcp-pmda-resctrl-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872816" comment="pcp-pmda-roomtemp-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872817" comment="pcp-pmda-rsyslog-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872818" comment="pcp-pmda-samba-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872819" comment="pcp-pmda-sendmail-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872820" comment="pcp-pmda-shping-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872821" comment="pcp-pmda-slurm-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872822" comment="pcp-pmda-smart-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872823" comment="pcp-pmda-snmp-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872824" comment="pcp-pmda-sockets-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872825" comment="pcp-pmda-statsd-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872826" comment="pcp-pmda-summary-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872827" comment="pcp-pmda-systemd-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872828" comment="pcp-pmda-trace-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872829" comment="pcp-pmda-unbound-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872830" comment="pcp-pmda-weblog-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872831" comment="pcp-pmda-zimbra-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872832" comment="pcp-pmda-zswap-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872833" comment="pcp-selinux-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872834" comment="pcp-system-tools-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872835" comment="pcp-zeroconf-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872836" comment="perl-PCP-LogImport-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872837" comment="perl-PCP-LogSummary-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872838" comment="perl-PCP-MMV-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872839" comment="perl-PCP-PMDA-6.2.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872840" comment="python3-pcp-6.2.0-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4181" version="1" class="patch">
	<metadata>
		<title>security update for motif (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-43788" ref_url="https://www.suse.com/security/cve/CVE-2023-43788/" source="CVE"/>
		<reference ref_id="CVE-2023-43789" ref_url="https://www.suse.com/security/cve/CVE-2023-43789/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2217.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2217.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43788/">CVE-2023-43788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43788">CVE-2023-43788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43789/">CVE-2023-43789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43789">CVE-2023-43789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866522" comment="motif-2.3.4-28.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866523" comment="motif-devel-2.3.4-28.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4182" version="1" class="patch">
	<metadata>
		<title>security update for perl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-47038" ref_url="https://www.suse.com/security/cve/CVE-2023-47038/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2228.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2228.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-47038/">CVE-2023-47038 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47038">CVE-2023-47038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866524" comment="perl-5.32.1-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866525" comment="perl-Attribute-Handlers-1.01-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866526" comment="perl-AutoLoader-5.74-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866527" comment="perl-AutoSplit-5.74-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866528" comment="perl-B-1.80-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866529" comment="perl-Benchmark-1.23-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866530" comment="perl-Class-Struct-0.66-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866531" comment="perl-Config-Extensions-0.03-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866532" comment="perl-DBM_Filter-0.06-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866533" comment="perl-Devel-Peek-1.28-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866534" comment="perl-Devel-SelfStubber-1.06-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866535" comment="perl-DirHandle-1.05-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866536" comment="perl-Dumpvalue-2.27-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866537" comment="perl-DynaLoader-1.47-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866538" comment="perl-English-1.11-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866539" comment="perl-Errno-1.30-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866540" comment="perl-ExtUtils-Constant-0.25-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866541" comment="perl-ExtUtils-Embed-1.35-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866542" comment="perl-ExtUtils-Miniperl-1.09-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866543" comment="perl-Fcntl-1.13-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866544" comment="perl-File-Basename-2.85-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866545" comment="perl-File-Compare-1.100.600-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866546" comment="perl-File-Copy-2.34-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866547" comment="perl-File-DosGlob-1.12-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866548" comment="perl-File-Find-1.37-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866549" comment="perl-File-stat-1.09-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866550" comment="perl-FileCache-1.10-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866551" comment="perl-FileHandle-2.03-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866552" comment="perl-FindBin-1.51-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866553" comment="perl-GDBM_File-1.18-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866554" comment="perl-Getopt-Std-1.12-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866555" comment="perl-Hash-Util-0.23-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866556" comment="perl-Hash-Util-FieldHash-1.20-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866557" comment="perl-I18N-Collate-1.02-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866558" comment="perl-I18N-LangTags-0.44-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866559" comment="perl-I18N-Langinfo-0.19-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866560" comment="perl-IO-1.43-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866561" comment="perl-IPC-Open3-1.21-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866562" comment="perl-Locale-Maketext-Simple-0.21-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866563" comment="perl-Math-Complex-1.59-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866564" comment="perl-Memoize-1.03-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866565" comment="perl-Module-Loaded-0.08-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866566" comment="perl-NDBM_File-1.15-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866567" comment="perl-NEXT-0.67-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866568" comment="perl-Net-1.02-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866569" comment="perl-ODBM_File-1.16-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866570" comment="perl-Opcode-1.48-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866571" comment="perl-POSIX-1.94-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866572" comment="perl-Pod-Functions-1.13-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866573" comment="perl-Pod-Html-1.25-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866574" comment="perl-Safe-2.41-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866575" comment="perl-Search-Dict-1.07-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866576" comment="perl-SelectSaver-1.02-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866577" comment="perl-SelfLoader-1.26-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866578" comment="perl-Symbol-1.08-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866579" comment="perl-Sys-Hostname-1.23-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866580" comment="perl-Term-Complete-1.403-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866581" comment="perl-Term-ReadLine-1.17-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866582" comment="perl-Test-1.31-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866583" comment="perl-Text-Abbrev-1.02-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866584" comment="perl-Thread-3.05-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866585" comment="perl-Thread-Semaphore-2.13-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866586" comment="perl-Tie-4.6-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866587" comment="perl-Tie-File-1.06-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866588" comment="perl-Tie-Memoize-1.1-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866589" comment="perl-Time-1.03-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866590" comment="perl-Time-Piece-1.3401-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866591" comment="perl-Unicode-UCD-0.75-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866592" comment="perl-User-pwent-1.03-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866593" comment="perl-autouse-1.11-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866594" comment="perl-base-2.27-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866595" comment="perl-blib-1.07-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866596" comment="perl-debugger-1.56-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866597" comment="perl-deprecate-0.04-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866598" comment="perl-devel-5.32.1-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866599" comment="perl-diagnostics-1.37-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866600" comment="perl-doc-5.32.1-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866601" comment="perl-encoding-warnings-0.13-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866602" comment="perl-fields-2.27-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866603" comment="perl-filetest-1.03-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866604" comment="perl-if-0.60.800-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866605" comment="perl-interpreter-5.32.1-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866606" comment="perl-less-0.03-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866607" comment="perl-lib-0.65-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866608" comment="perl-libnetcfg-5.32.1-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866609" comment="perl-libs-5.32.1-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866610" comment="perl-locale-1.09-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866611" comment="perl-macros-5.32.1-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866612" comment="perl-meta-notation-5.32.1-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866613" comment="perl-mro-1.23-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866614" comment="perl-open-1.12-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866615" comment="perl-overload-1.31-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866616" comment="perl-overloading-0.02-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866617" comment="perl-ph-5.32.1-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866618" comment="perl-sigtrap-1.09-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866619" comment="perl-sort-2.04-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866620" comment="perl-subs-1.03-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866621" comment="perl-utils-5.32.1-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866622" comment="perl-vars-1.05-481.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866623" comment="perl-vmsish-1.04-481.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4183" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2496" ref_url="https://www.suse.com/security/cve/CVE-2024-2496/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2236.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2236.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2496/">CVE-2024-2496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2496">CVE-2024-2496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868719" comment="libvirt-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868720" comment="libvirt-client-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868721" comment="libvirt-client-qemu-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868722" comment="libvirt-daemon-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868723" comment="libvirt-daemon-common-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868724" comment="libvirt-daemon-config-network-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868725" comment="libvirt-daemon-config-nwfilter-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868726" comment="libvirt-daemon-driver-interface-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868727" comment="libvirt-daemon-driver-network-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868728" comment="libvirt-daemon-driver-nodedev-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868729" comment="libvirt-daemon-driver-nwfilter-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868730" comment="libvirt-daemon-driver-qemu-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868731" comment="libvirt-daemon-driver-secret-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868732" comment="libvirt-daemon-driver-storage-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868733" comment="libvirt-daemon-driver-storage-core-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868734" comment="libvirt-daemon-driver-storage-disk-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868735" comment="libvirt-daemon-driver-storage-iscsi-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868736" comment="libvirt-daemon-driver-storage-logical-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868737" comment="libvirt-daemon-driver-storage-mpath-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868738" comment="libvirt-daemon-driver-storage-rbd-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868739" comment="libvirt-daemon-driver-storage-scsi-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868740" comment="libvirt-daemon-kvm-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868741" comment="libvirt-daemon-lock-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868742" comment="libvirt-daemon-log-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868743" comment="libvirt-daemon-plugin-lockd-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868744" comment="libvirt-daemon-plugin-sanlock-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868745" comment="libvirt-daemon-proxy-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868746" comment="libvirt-devel-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868747" comment="libvirt-docs-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868748" comment="libvirt-libs-10.0.0-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868749" comment="libvirt-nss-10.0.0-6.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4184" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-45287" ref_url="https://www.suse.com/security/cve/CVE-2023-45287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2239.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2239.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45287/">CVE-2023-45287 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45287">CVE-2023-45287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868530" comment="skopeo-1.14.3-0.1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868531" comment="skopeo-tests-1.14.3-0.1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4185" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326/" source="CVE"/>
		<reference ref_id="CVE-2023-45287" ref_url="https://www.suse.com/security/cve/CVE-2023-45287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2245.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2245.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45287/">CVE-2023-45287 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45287">CVE-2023-45287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866624" comment="buildah-1.33.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866625" comment="buildah-tests-1.33.6-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4186" version="1" class="patch">
	<metadata>
		<title>security update for ansible-core (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-0690" ref_url="https://www.suse.com/security/cve/CVE-2024-0690/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2246.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2246.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0690/">CVE-2024-0690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0690">CVE-2024-0690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009876437" comment="ansible-core-2.14.14-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876438" comment="ansible-test-2.14.14-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4187" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-36763" ref_url="https://www.suse.com/security/cve/CVE-2022-36763/" source="CVE"/>
		<reference ref_id="CVE-2022-36764" ref_url="https://www.suse.com/security/cve/CVE-2022-36764/" source="CVE"/>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<reference ref_id="CVE-2023-45229" ref_url="https://www.suse.com/security/cve/CVE-2023-45229/" source="CVE"/>
		<reference ref_id="CVE-2023-45231" ref_url="https://www.suse.com/security/cve/CVE-2023-45231/" source="CVE"/>
		<reference ref_id="CVE-2023-45232" ref_url="https://www.suse.com/security/cve/CVE-2023-45232/" source="CVE"/>
		<reference ref_id="CVE-2023-45233" ref_url="https://www.suse.com/security/cve/CVE-2023-45233/" source="CVE"/>
		<reference ref_id="CVE-2023-45235" ref_url="https://www.suse.com/security/cve/CVE-2023-45235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2264.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2264.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36763/">CVE-2022-36763 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36763">CVE-2022-36763 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36764/">CVE-2022-36764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36764">CVE-2022-36764 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45229/">CVE-2023-45229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45229">CVE-2023-45229 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45231/">CVE-2023-45231 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45231">CVE-2023-45231 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45232/">CVE-2023-45232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45232">CVE-2023-45232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45233/">CVE-2023-45233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45233">CVE-2023-45233 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45235/">CVE-2023-45235 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45235">CVE-2023-45235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866626" comment="edk2-ovmf-20231122-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866627" comment="edk2-tools-20231122-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866628" comment="edk2-tools-doc-20231122-6.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4188" version="1" class="patch">
	<metadata>
		<title>security update for containernetworking-plugins (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326/" source="CVE"/>
		<reference ref_id="CVE-2023-45287" ref_url="https://www.suse.com/security/cve/CVE-2023-45287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2272.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2272.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45287/">CVE-2023-45287 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45287">CVE-2023-45287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866629" comment="containernetworking-plugins-1.4.0-2.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4189" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtbase (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-51714" ref_url="https://www.suse.com/security/cve/CVE-2023-51714/" source="CVE"/>
		<reference ref_id="CVE-2024-25580" ref_url="https://www.suse.com/security/cve/CVE-2024-25580/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2276.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2276.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51714/">CVE-2023-51714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51714">CVE-2023-51714 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25580/">CVE-2024-25580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25580">CVE-2024-25580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866630" comment="qt5-qtbase-5.15.9-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866631" comment="qt5-qtbase-common-5.15.9-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866632" comment="qt5-qtbase-devel-5.15.9-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866633" comment="qt5-qtbase-examples-5.15.9-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866634" comment="qt5-qtbase-gui-5.15.9-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866635" comment="qt5-qtbase-mysql-5.15.9-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866636" comment="qt5-qtbase-odbc-5.15.9-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866637" comment="qt5-qtbase-postgresql-5.15.9-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866638" comment="qt5-qtbase-private-devel-5.15.9-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866639" comment="qt5-qtbase-static-5.15.9-9.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4190" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-31122" ref_url="https://www.suse.com/security/cve/CVE-2023-31122/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2278.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2278.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31122/">CVE-2023-31122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31122">CVE-2023-31122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866640" comment="httpd-2.4.57-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866641" comment="httpd-core-2.4.57-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866642" comment="httpd-devel-2.4.57-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866643" comment="httpd-filesystem-2.4.57-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866644" comment="httpd-manual-2.4.57-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866645" comment="httpd-tools-2.4.57-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866646" comment="mod_ldap-2.4.57-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866647" comment="mod_lua-2.4.57-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866648" comment="mod_proxy_html-2.4.57-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866649" comment="mod_session-2.4.57-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866650" comment="mod_ssl-2.4.57-8.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4191" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-bad-free (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-40474" ref_url="https://www.suse.com/security/cve/CVE-2023-40474/" source="CVE"/>
		<reference ref_id="CVE-2023-40475" ref_url="https://www.suse.com/security/cve/CVE-2023-40475/" source="CVE"/>
		<reference ref_id="CVE-2023-40476" ref_url="https://www.suse.com/security/cve/CVE-2023-40476/" source="CVE"/>
		<reference ref_id="CVE-2023-50186" ref_url="https://www.suse.com/security/cve/CVE-2023-50186/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2287.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2287.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40474/">CVE-2023-40474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40474">CVE-2023-40474 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40475/">CVE-2023-40475 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40475">CVE-2023-40475 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-40476/">CVE-2023-40476 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40476">CVE-2023-40476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50186/">CVE-2023-50186 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50186">CVE-2023-50186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866651" comment="gstreamer1-plugins-bad-free-1.22.1-4.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866652" comment="gstreamer1-plugins-bad-free-devel-1.22.1-4.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4192" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-40090" ref_url="https://www.suse.com/security/cve/CVE-2022-40090/" source="CVE"/>
		<reference ref_id="CVE-2023-3618" ref_url="https://www.suse.com/security/cve/CVE-2023-3618/" source="CVE"/>
		<reference ref_id="CVE-2023-40745" ref_url="https://www.suse.com/security/cve/CVE-2023-40745/" source="CVE"/>
		<reference ref_id="CVE-2023-41175" ref_url="https://www.suse.com/security/cve/CVE-2023-41175/" source="CVE"/>
		<reference ref_id="CVE-2023-6228" ref_url="https://www.suse.com/security/cve/CVE-2023-6228/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2289.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2289.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40090/">CVE-2022-40090 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40090">CVE-2022-40090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3618/">CVE-2023-3618 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3618">CVE-2023-3618 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40745/">CVE-2023-40745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40745">CVE-2023-40745 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41175/">CVE-2023-41175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41175">CVE-2023-41175 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-6228/">CVE-2023-6228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6228">CVE-2023-6228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866653" comment="libtiff-4.4.0-12.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866654" comment="libtiff-devel-4.4.0-12.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866655" comment="libtiff-tools-4.4.0-12.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4193" version="1" class="patch">
	<metadata>
		<title>security update for mutt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4874" ref_url="https://www.suse.com/security/cve/CVE-2023-4874/" source="CVE"/>
		<reference ref_id="CVE-2023-4875" ref_url="https://www.suse.com/security/cve/CVE-2023-4875/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2290.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2290.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4874/">CVE-2023-4874 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4874">CVE-2023-4874 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4875/">CVE-2023-4875 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4875">CVE-2023-4875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866656" comment="mutt-2.2.6-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4194" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2292.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2292.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866657" comment="python3.11-3.11.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866658" comment="python3.11-debug-3.11.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866659" comment="python3.11-devel-3.11.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866660" comment="python3.11-idle-3.11.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866661" comment="python3.11-libs-3.11.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866662" comment="python3.11-test-3.11.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866663" comment="python3.11-tkinter-3.11.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4195" version="1" class="patch">
	<metadata>
		<title>security update for libjpeg-turbo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-29390" ref_url="https://www.suse.com/security/cve/CVE-2021-29390/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2295.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2295.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29390/">CVE-2021-29390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29390">CVE-2021-29390 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866664" comment="libjpeg-turbo-2.0.90-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866665" comment="libjpeg-turbo-devel-2.0.90-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866666" comment="libjpeg-turbo-utils-2.0.90-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866667" comment="turbojpeg-2.0.90-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866668" comment="turbojpeg-devel-2.0.90-7.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4196" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5380" ref_url="https://www.suse.com/security/cve/CVE-2023-5380/" source="CVE"/>
		<reference ref_id="CVE-2023-5574" ref_url="https://www.suse.com/security/cve/CVE-2023-5574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2298.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2298.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5380/">CVE-2023-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5380">CVE-2023-5380 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5574/">CVE-2023-5574 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5574">CVE-2023-5574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866669" comment="tigervnc-1.13.1-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866670" comment="tigervnc-icons-1.13.1-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866671" comment="tigervnc-license-1.13.1-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866672" comment="tigervnc-selinux-1.13.1-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866673" comment="tigervnc-server-1.13.1-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866674" comment="tigervnc-server-minimal-1.13.1-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866675" comment="tigervnc-server-module-1.13.1-8.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4197" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-37328" ref_url="https://www.suse.com/security/cve/CVE-2023-37328/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2302.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2302.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37328/">CVE-2023-37328 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37328">CVE-2023-37328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866676" comment="gstreamer1-plugins-base-1.22.1-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866677" comment="gstreamer1-plugins-base-devel-1.22.1-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866678" comment="gstreamer1-plugins-base-tools-1.22.1-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4198" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-good (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-37327" ref_url="https://www.suse.com/security/cve/CVE-2023-37327/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2303.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2303.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37327/">CVE-2023-37327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37327">CVE-2023-37327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866679" comment="gstreamer1-plugins-good-1.22.1-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866680" comment="gstreamer1-plugins-good-gtk-1.22.1-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4199" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-cryptography (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-49083" ref_url="https://www.suse.com/security/cve/CVE-2023-49083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2337.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2337.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49083/">CVE-2023-49083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866681" comment="python3.11-cryptography-37.0.2-6.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4200" version="1" class="patch">
	<metadata>
		<title>security update for python-jinja2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-22195" ref_url="https://www.suse.com/security/cve/CVE-2024-22195/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2348.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2348.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22195/">CVE-2024-22195 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22195">CVE-2024-22195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866682" comment="python3-jinja2-2.11.3-5.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4201" version="1" class="patch">
	<metadata>
		<title>security update for mingw-binutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-1579" ref_url="https://www.suse.com/security/cve/CVE-2023-1579/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2353.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2353.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1579/">CVE-2023-1579 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1579">CVE-2023-1579 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866683" comment="mingw-binutils-generic-2.41-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866684" comment="mingw-filesystem-base-148-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866685" comment="mingw-w64-tools-11.0.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866686" comment="mingw32-binutils-2.41-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866687" comment="mingw32-cpp-13.2.1-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866688" comment="mingw32-crt-11.0.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866689" comment="mingw32-filesystem-148-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866690" comment="mingw32-gcc-13.2.1-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866691" comment="mingw32-gcc-c++-13.2.1-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866692" comment="mingw32-headers-11.0.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866693" comment="mingw32-libffi-3.4.4-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866694" comment="mingw32-libgcc-13.2.1-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866695" comment="mingw32-libstdc++-13.2.1-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866696" comment="mingw32-winpthreads-11.0.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866697" comment="mingw32-winpthreads-static-11.0.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866698" comment="mingw32-zlib-1.3.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866699" comment="mingw32-zlib-static-1.3.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866700" comment="mingw64-binutils-2.41-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866701" comment="mingw64-cpp-13.2.1-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866702" comment="mingw64-crt-11.0.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866703" comment="mingw64-filesystem-148-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866704" comment="mingw64-gcc-13.2.1-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866705" comment="mingw64-gcc-c++-13.2.1-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866706" comment="mingw64-headers-11.0.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866707" comment="mingw64-libffi-3.4.4-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866708" comment="mingw64-libgcc-13.2.1-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866709" comment="mingw64-libstdc++-13.2.1-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866710" comment="mingw64-winpthreads-11.0.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866711" comment="mingw64-winpthreads-static-11.0.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866712" comment="mingw64-zlib-1.3.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866713" comment="mingw64-zlib-static-1.3.1-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4202" version="1" class="patch">
	<metadata>
		<title>security update for freeglut (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24258" ref_url="https://www.suse.com/security/cve/CVE-2024-24258/" source="CVE"/>
		<reference ref_id="CVE-2024-24259" ref_url="https://www.suse.com/security/cve/CVE-2024-24259/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2366.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2366.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24258/">CVE-2024-24258 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24258">CVE-2024-24258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24259/">CVE-2024-24259 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24259">CVE-2024-24259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866714" comment="freeglut-3.2.1-10.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866715" comment="freeglut-devel-3.2.1-10.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4203" version="1" class="patch">
	<metadata>
		<title>security update for mod_http2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-43622" ref_url="https://www.suse.com/security/cve/CVE-2023-43622/" source="CVE"/>
		<reference ref_id="CVE-2023-45802" ref_url="https://www.suse.com/security/cve/CVE-2023-45802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2368.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2368.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43622/">CVE-2023-43622 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43622">CVE-2023-43622 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45802/">CVE-2023-45802 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45802">CVE-2023-45802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866716" comment="mod_http2-2.0.26-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4204" version="1" class="patch">
	<metadata>
		<title>security update for zziplib (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-18770" ref_url="https://www.suse.com/security/cve/CVE-2020-18770/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2377.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2377.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-18770/">CVE-2020-18770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18770">CVE-2020-18770 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866717" comment="zziplib-0.13.71-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866718" comment="zziplib-devel-0.13.71-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866719" comment="zziplib-utils-0.13.71-11.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4205" version="1" class="patch">
	<metadata>
		<title>security update for mod_jk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-41081" ref_url="https://www.suse.com/security/cve/CVE-2023-41081/" source="CVE"/>
		<reference ref_id="CVE-2023-6710" ref_url="https://www.suse.com/security/cve/CVE-2023-6710/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2387.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2387.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41081/">CVE-2023-41081 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41081">CVE-2023-41081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6710/">CVE-2023-6710 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6710">CVE-2023-6710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866720" comment="mod_jk-1.2.49-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866721" comment="mod_proxy_cluster-1.3.20-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4206" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555/" source="CVE"/>
		<reference ref_id="CVE-2021-47579" ref_url="https://www.suse.com/security/cve/CVE-2021-47579/" source="CVE"/>
		<reference ref_id="CVE-2022-0480" ref_url="https://www.suse.com/security/cve/CVE-2022-0480/" source="CVE"/>
		<reference ref_id="CVE-2022-38096" ref_url="https://www.suse.com/security/cve/CVE-2022-38096/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="CVE-2022-48632" ref_url="https://www.suse.com/security/cve/CVE-2022-48632/" source="CVE"/>
		<reference ref_id="CVE-2022-48947" ref_url="https://www.suse.com/security/cve/CVE-2022-48947/" source="CVE"/>
		<reference ref_id="CVE-2022-49011" ref_url="https://www.suse.com/security/cve/CVE-2022-49011/" source="CVE"/>
		<reference ref_id="CVE-2022-49322" ref_url="https://www.suse.com/security/cve/CVE-2022-49322/" source="CVE"/>
		<reference ref_id="CVE-2022-49350" ref_url="https://www.suse.com/security/cve/CVE-2022-49350/" source="CVE"/>
		<reference ref_id="CVE-2022-49721" ref_url="https://www.suse.com/security/cve/CVE-2022-49721/" source="CVE"/>
		<reference ref_id="CVE-2022-49744" ref_url="https://www.suse.com/security/cve/CVE-2022-49744/" source="CVE"/>
		<reference ref_id="CVE-2022-49754" ref_url="https://www.suse.com/security/cve/CVE-2022-49754/" source="CVE"/>
		<reference ref_id="CVE-2022-49940" ref_url="https://www.suse.com/security/cve/CVE-2022-49940/" source="CVE"/>
		<reference ref_id="CVE-2022-49977" ref_url="https://www.suse.com/security/cve/CVE-2022-49977/" source="CVE"/>
		<reference ref_id="CVE-2022-50080" ref_url="https://www.suse.com/security/cve/CVE-2022-50080/" source="CVE"/>
		<reference ref_id="CVE-2022-50116" ref_url="https://www.suse.com/security/cve/CVE-2022-50116/" source="CVE"/>
		<reference ref_id="CVE-2022-50202" ref_url="https://www.suse.com/security/cve/CVE-2022-50202/" source="CVE"/>
		<reference ref_id="CVE-2022-50277" ref_url="https://www.suse.com/security/cve/CVE-2022-50277/" source="CVE"/>
		<reference ref_id="CVE-2022-50286" ref_url="https://www.suse.com/security/cve/CVE-2022-50286/" source="CVE"/>
		<reference ref_id="CVE-2022-50313" ref_url="https://www.suse.com/security/cve/CVE-2022-50313/" source="CVE"/>
		<reference ref_id="CVE-2022-50318" ref_url="https://www.suse.com/security/cve/CVE-2022-50318/" source="CVE"/>
		<reference ref_id="CVE-2022-50374" ref_url="https://www.suse.com/security/cve/CVE-2022-50374/" source="CVE"/>
		<reference ref_id="CVE-2022-50377" ref_url="https://www.suse.com/security/cve/CVE-2022-50377/" source="CVE"/>
		<reference ref_id="CVE-2022-50447" ref_url="https://www.suse.com/security/cve/CVE-2022-50447/" source="CVE"/>
		<reference ref_id="CVE-2022-50453" ref_url="https://www.suse.com/security/cve/CVE-2022-50453/" source="CVE"/>
		<reference ref_id="CVE-2022-50485" ref_url="https://www.suse.com/security/cve/CVE-2022-50485/" source="CVE"/>
		<reference ref_id="CVE-2022-50637" ref_url="https://www.suse.com/security/cve/CVE-2022-50637/" source="CVE"/>
		<reference ref_id="CVE-2022-50638" ref_url="https://www.suse.com/security/cve/CVE-2022-50638/" source="CVE"/>
		<reference ref_id="CVE-2022-50642" ref_url="https://www.suse.com/security/cve/CVE-2022-50642/" source="CVE"/>
		<reference ref_id="CVE-2022-50673" ref_url="https://www.suse.com/security/cve/CVE-2022-50673/" source="CVE"/>
		<reference ref_id="CVE-2022-50736" ref_url="https://www.suse.com/security/cve/CVE-2022-50736/" source="CVE"/>
		<reference ref_id="CVE-2022-50777" ref_url="https://www.suse.com/security/cve/CVE-2022-50777/" source="CVE"/>
		<reference ref_id="CVE-2022-50780" ref_url="https://www.suse.com/security/cve/CVE-2022-50780/" source="CVE"/>
		<reference ref_id="CVE-2022-50782" ref_url="https://www.suse.com/security/cve/CVE-2022-50782/" source="CVE"/>
		<reference ref_id="CVE-2022-50845" ref_url="https://www.suse.com/security/cve/CVE-2022-50845/" source="CVE"/>
		<reference ref_id="CVE-2022-50879" ref_url="https://www.suse.com/security/cve/CVE-2022-50879/" source="CVE"/>
		<reference ref_id="CVE-2023-24023" ref_url="https://www.suse.com/security/cve/CVE-2023-24023/" source="CVE"/>
		<reference ref_id="CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775/" source="CVE"/>
		<reference ref_id="CVE-2023-28464" ref_url="https://www.suse.com/security/cve/CVE-2023-28464/" source="CVE"/>
		<reference ref_id="CVE-2023-28866" ref_url="https://www.suse.com/security/cve/CVE-2023-28866/" source="CVE"/>
		<reference ref_id="CVE-2023-31083" ref_url="https://www.suse.com/security/cve/CVE-2023-31083/" source="CVE"/>
		<reference ref_id="CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453/" source="CVE"/>
		<reference ref_id="CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-39194" ref_url="https://www.suse.com/security/cve/CVE-2023-39194/" source="CVE"/>
		<reference ref_id="CVE-2023-39198" ref_url="https://www.suse.com/security/cve/CVE-2023-39198/" source="CVE"/>
		<reference ref_id="CVE-2023-4133" ref_url="https://www.suse.com/security/cve/CVE-2023-4133/" source="CVE"/>
		<reference ref_id="CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754/" source="CVE"/>
		<reference ref_id="CVE-2023-42756" ref_url="https://www.suse.com/security/cve/CVE-2023-42756/" source="CVE"/>
		<reference ref_id="CVE-2023-45863" ref_url="https://www.suse.com/security/cve/CVE-2023-45863/" source="CVE"/>
		<reference ref_id="CVE-2023-46862" ref_url="https://www.suse.com/security/cve/CVE-2023-46862/" source="CVE"/>
		<reference ref_id="CVE-2023-51043" ref_url="https://www.suse.com/security/cve/CVE-2023-51043/" source="CVE"/>
		<reference ref_id="CVE-2023-51779" ref_url="https://www.suse.com/security/cve/CVE-2023-51779/" source="CVE"/>
		<reference ref_id="CVE-2023-51780" ref_url="https://www.suse.com/security/cve/CVE-2023-51780/" source="CVE"/>
		<reference ref_id="CVE-2023-52434" ref_url="https://www.suse.com/security/cve/CVE-2023-52434/" source="CVE"/>
		<reference ref_id="CVE-2023-52448" ref_url="https://www.suse.com/security/cve/CVE-2023-52448/" source="CVE"/>
		<reference ref_id="CVE-2023-52450" ref_url="https://www.suse.com/security/cve/CVE-2023-52450/" source="CVE"/>
		<reference ref_id="CVE-2023-52469" ref_url="https://www.suse.com/security/cve/CVE-2023-52469/" source="CVE"/>
		<reference ref_id="CVE-2023-52470" ref_url="https://www.suse.com/security/cve/CVE-2023-52470/" source="CVE"/>
		<reference ref_id="CVE-2023-52476" ref_url="https://www.suse.com/security/cve/CVE-2023-52476/" source="CVE"/>
		<reference ref_id="CVE-2023-52478" ref_url="https://www.suse.com/security/cve/CVE-2023-52478/" source="CVE"/>
		<reference ref_id="CVE-2023-52486" ref_url="https://www.suse.com/security/cve/CVE-2023-52486/" source="CVE"/>
		<reference ref_id="CVE-2023-52489" ref_url="https://www.suse.com/security/cve/CVE-2023-52489/" source="CVE"/>
		<reference ref_id="CVE-2023-52522" ref_url="https://www.suse.com/security/cve/CVE-2023-52522/" source="CVE"/>
		<reference ref_id="CVE-2023-52529" ref_url="https://www.suse.com/security/cve/CVE-2023-52529/" source="CVE"/>
		<reference ref_id="CVE-2023-52574" ref_url="https://www.suse.com/security/cve/CVE-2023-52574/" source="CVE"/>
		<reference ref_id="CVE-2023-52578" ref_url="https://www.suse.com/security/cve/CVE-2023-52578/" source="CVE"/>
		<reference ref_id="CVE-2023-52580" ref_url="https://www.suse.com/security/cve/CVE-2023-52580/" source="CVE"/>
		<reference ref_id="CVE-2023-52581" ref_url="https://www.suse.com/security/cve/CVE-2023-52581/" source="CVE"/>
		<reference ref_id="CVE-2023-52597" ref_url="https://www.suse.com/security/cve/CVE-2023-52597/" source="CVE"/>
		<reference ref_id="CVE-2023-52610" ref_url="https://www.suse.com/security/cve/CVE-2023-52610/" source="CVE"/>
		<reference ref_id="CVE-2023-52620" ref_url="https://www.suse.com/security/cve/CVE-2023-52620/" source="CVE"/>
		<reference ref_id="CVE-2023-52628" ref_url="https://www.suse.com/security/cve/CVE-2023-52628/" source="CVE"/>
		<reference ref_id="CVE-2023-52817" ref_url="https://www.suse.com/security/cve/CVE-2023-52817/" source="CVE"/>
		<reference ref_id="CVE-2023-52832" ref_url="https://www.suse.com/security/cve/CVE-2023-52832/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2023-52934" ref_url="https://www.suse.com/security/cve/CVE-2023-52934/" source="CVE"/>
		<reference ref_id="CVE-2023-52939" ref_url="https://www.suse.com/security/cve/CVE-2023-52939/" source="CVE"/>
		<reference ref_id="CVE-2023-52940" ref_url="https://www.suse.com/security/cve/CVE-2023-52940/" source="CVE"/>
		<reference ref_id="CVE-2023-52973" ref_url="https://www.suse.com/security/cve/CVE-2023-52973/" source="CVE"/>
		<reference ref_id="CVE-2023-52976" ref_url="https://www.suse.com/security/cve/CVE-2023-52976/" source="CVE"/>
		<reference ref_id="CVE-2023-52984" ref_url="https://www.suse.com/security/cve/CVE-2023-52984/" source="CVE"/>
		<reference ref_id="CVE-2023-52985" ref_url="https://www.suse.com/security/cve/CVE-2023-52985/" source="CVE"/>
		<reference ref_id="CVE-2023-52999" ref_url="https://www.suse.com/security/cve/CVE-2023-52999/" source="CVE"/>
		<reference ref_id="CVE-2023-53004" ref_url="https://www.suse.com/security/cve/CVE-2023-53004/" source="CVE"/>
		<reference ref_id="CVE-2023-53016" ref_url="https://www.suse.com/security/cve/CVE-2023-53016/" source="CVE"/>
		<reference ref_id="CVE-2023-53017" ref_url="https://www.suse.com/security/cve/CVE-2023-53017/" source="CVE"/>
		<reference ref_id="CVE-2023-53018" ref_url="https://www.suse.com/security/cve/CVE-2023-53018/" source="CVE"/>
		<reference ref_id="CVE-2023-53019" ref_url="https://www.suse.com/security/cve/CVE-2023-53019/" source="CVE"/>
		<reference ref_id="CVE-2023-53046" ref_url="https://www.suse.com/security/cve/CVE-2023-53046/" source="CVE"/>
		<reference ref_id="CVE-2023-53047" ref_url="https://www.suse.com/security/cve/CVE-2023-53047/" source="CVE"/>
		<reference ref_id="CVE-2023-53052" ref_url="https://www.suse.com/security/cve/CVE-2023-53052/" source="CVE"/>
		<reference ref_id="CVE-2023-53057" ref_url="https://www.suse.com/security/cve/CVE-2023-53057/" source="CVE"/>
		<reference ref_id="CVE-2023-53094" ref_url="https://www.suse.com/security/cve/CVE-2023-53094/" source="CVE"/>
		<reference ref_id="CVE-2023-53097" ref_url="https://www.suse.com/security/cve/CVE-2023-53097/" source="CVE"/>
		<reference ref_id="CVE-2023-53134" ref_url="https://www.suse.com/security/cve/CVE-2023-53134/" source="CVE"/>
		<reference ref_id="CVE-2023-53140" ref_url="https://www.suse.com/security/cve/CVE-2023-53140/" source="CVE"/>
		<reference ref_id="CVE-2023-53148" ref_url="https://www.suse.com/security/cve/CVE-2023-53148/" source="CVE"/>
		<reference ref_id="CVE-2023-53149" ref_url="https://www.suse.com/security/cve/CVE-2023-53149/" source="CVE"/>
		<reference ref_id="CVE-2023-53150" ref_url="https://www.suse.com/security/cve/CVE-2023-53150/" source="CVE"/>
		<reference ref_id="CVE-2023-53151" ref_url="https://www.suse.com/security/cve/CVE-2023-53151/" source="CVE"/>
		<reference ref_id="CVE-2023-53152" ref_url="https://www.suse.com/security/cve/CVE-2023-53152/" source="CVE"/>
		<reference ref_id="CVE-2023-53164" ref_url="https://www.suse.com/security/cve/CVE-2023-53164/" source="CVE"/>
		<reference ref_id="CVE-2023-53180" ref_url="https://www.suse.com/security/cve/CVE-2023-53180/" source="CVE"/>
		<reference ref_id="CVE-2023-53181" ref_url="https://www.suse.com/security/cve/CVE-2023-53181/" source="CVE"/>
		<reference ref_id="CVE-2023-53184" ref_url="https://www.suse.com/security/cve/CVE-2023-53184/" source="CVE"/>
		<reference ref_id="CVE-2023-53192" ref_url="https://www.suse.com/security/cve/CVE-2023-53192/" source="CVE"/>
		<reference ref_id="CVE-2023-53193" ref_url="https://www.suse.com/security/cve/CVE-2023-53193/" source="CVE"/>
		<reference ref_id="CVE-2023-53202" ref_url="https://www.suse.com/security/cve/CVE-2023-53202/" source="CVE"/>
		<reference ref_id="CVE-2023-53204" ref_url="https://www.suse.com/security/cve/CVE-2023-53204/" source="CVE"/>
		<reference ref_id="CVE-2023-53208" ref_url="https://www.suse.com/security/cve/CVE-2023-53208/" source="CVE"/>
		<reference ref_id="CVE-2023-53209" ref_url="https://www.suse.com/security/cve/CVE-2023-53209/" source="CVE"/>
		<reference ref_id="CVE-2023-53210" ref_url="https://www.suse.com/security/cve/CVE-2023-53210/" source="CVE"/>
		<reference ref_id="CVE-2023-53221" ref_url="https://www.suse.com/security/cve/CVE-2023-53221/" source="CVE"/>
		<reference ref_id="CVE-2023-53228" ref_url="https://www.suse.com/security/cve/CVE-2023-53228/" source="CVE"/>
		<reference ref_id="CVE-2023-53235" ref_url="https://www.suse.com/security/cve/CVE-2023-53235/" source="CVE"/>
		<reference ref_id="CVE-2023-53237" ref_url="https://www.suse.com/security/cve/CVE-2023-53237/" source="CVE"/>
		<reference ref_id="CVE-2023-53246" ref_url="https://www.suse.com/security/cve/CVE-2023-53246/" source="CVE"/>
		<reference ref_id="CVE-2023-53248" ref_url="https://www.suse.com/security/cve/CVE-2023-53248/" source="CVE"/>
		<reference ref_id="CVE-2023-53252" ref_url="https://www.suse.com/security/cve/CVE-2023-53252/" source="CVE"/>
		<reference ref_id="CVE-2023-53256" ref_url="https://www.suse.com/security/cve/CVE-2023-53256/" source="CVE"/>
		<reference ref_id="CVE-2023-53258" ref_url="https://www.suse.com/security/cve/CVE-2023-53258/" source="CVE"/>
		<reference ref_id="CVE-2023-53263" ref_url="https://www.suse.com/security/cve/CVE-2023-53263/" source="CVE"/>
		<reference ref_id="CVE-2023-53270" ref_url="https://www.suse.com/security/cve/CVE-2023-53270/" source="CVE"/>
		<reference ref_id="CVE-2023-53275" ref_url="https://www.suse.com/security/cve/CVE-2023-53275/" source="CVE"/>
		<reference ref_id="CVE-2023-53280" ref_url="https://www.suse.com/security/cve/CVE-2023-53280/" source="CVE"/>
		<reference ref_id="CVE-2023-53285" ref_url="https://www.suse.com/security/cve/CVE-2023-53285/" source="CVE"/>
		<reference ref_id="CVE-2023-53288" ref_url="https://www.suse.com/security/cve/CVE-2023-53288/" source="CVE"/>
		<reference ref_id="CVE-2023-53290" ref_url="https://www.suse.com/security/cve/CVE-2023-53290/" source="CVE"/>
		<reference ref_id="CVE-2023-53293" ref_url="https://www.suse.com/security/cve/CVE-2023-53293/" source="CVE"/>
		<reference ref_id="CVE-2023-53297" ref_url="https://www.suse.com/security/cve/CVE-2023-53297/" source="CVE"/>
		<reference ref_id="CVE-2023-53304" ref_url="https://www.suse.com/security/cve/CVE-2023-53304/" source="CVE"/>
		<reference ref_id="CVE-2023-53309" ref_url="https://www.suse.com/security/cve/CVE-2023-53309/" source="CVE"/>
		<reference ref_id="CVE-2023-53317" ref_url="https://www.suse.com/security/cve/CVE-2023-53317/" source="CVE"/>
		<reference ref_id="CVE-2023-53321" ref_url="https://www.suse.com/security/cve/CVE-2023-53321/" source="CVE"/>
		<reference ref_id="CVE-2023-53322" ref_url="https://www.suse.com/security/cve/CVE-2023-53322/" source="CVE"/>
		<reference ref_id="CVE-2023-53335" ref_url="https://www.suse.com/security/cve/CVE-2023-53335/" source="CVE"/>
		<reference ref_id="CVE-2023-53338" ref_url="https://www.suse.com/security/cve/CVE-2023-53338/" source="CVE"/>
		<reference ref_id="CVE-2023-53343" ref_url="https://www.suse.com/security/cve/CVE-2023-53343/" source="CVE"/>
		<reference ref_id="CVE-2023-53351" ref_url="https://www.suse.com/security/cve/CVE-2023-53351/" source="CVE"/>
		<reference ref_id="CVE-2023-53352" ref_url="https://www.suse.com/security/cve/CVE-2023-53352/" source="CVE"/>
		<reference ref_id="CVE-2023-53354" ref_url="https://www.suse.com/security/cve/CVE-2023-53354/" source="CVE"/>
		<reference ref_id="CVE-2023-53365" ref_url="https://www.suse.com/security/cve/CVE-2023-53365/" source="CVE"/>
		<reference ref_id="CVE-2023-53370" ref_url="https://www.suse.com/security/cve/CVE-2023-53370/" source="CVE"/>
		<reference ref_id="CVE-2023-53371" ref_url="https://www.suse.com/security/cve/CVE-2023-53371/" source="CVE"/>
		<reference ref_id="CVE-2023-53380" ref_url="https://www.suse.com/security/cve/CVE-2023-53380/" source="CVE"/>
		<reference ref_id="CVE-2023-53384" ref_url="https://www.suse.com/security/cve/CVE-2023-53384/" source="CVE"/>
		<reference ref_id="CVE-2023-53394" ref_url="https://www.suse.com/security/cve/CVE-2023-53394/" source="CVE"/>
		<reference ref_id="CVE-2023-53415" ref_url="https://www.suse.com/security/cve/CVE-2023-53415/" source="CVE"/>
		<reference ref_id="CVE-2023-53421" ref_url="https://www.suse.com/security/cve/CVE-2023-53421/" source="CVE"/>
		<reference ref_id="CVE-2023-53441" ref_url="https://www.suse.com/security/cve/CVE-2023-53441/" source="CVE"/>
		<reference ref_id="CVE-2023-53442" ref_url="https://www.suse.com/security/cve/CVE-2023-53442/" source="CVE"/>
		<reference ref_id="CVE-2023-53444" ref_url="https://www.suse.com/security/cve/CVE-2023-53444/" source="CVE"/>
		<reference ref_id="CVE-2023-53451" ref_url="https://www.suse.com/security/cve/CVE-2023-53451/" source="CVE"/>
		<reference ref_id="CVE-2023-53462" ref_url="https://www.suse.com/security/cve/CVE-2023-53462/" source="CVE"/>
		<reference ref_id="CVE-2023-53465" ref_url="https://www.suse.com/security/cve/CVE-2023-53465/" source="CVE"/>
		<reference ref_id="CVE-2023-53471" ref_url="https://www.suse.com/security/cve/CVE-2023-53471/" source="CVE"/>
		<reference ref_id="CVE-2023-53473" ref_url="https://www.suse.com/security/cve/CVE-2023-53473/" source="CVE"/>
		<reference ref_id="CVE-2023-53476" ref_url="https://www.suse.com/security/cve/CVE-2023-53476/" source="CVE"/>
		<reference ref_id="CVE-2023-53479" ref_url="https://www.suse.com/security/cve/CVE-2023-53479/" source="CVE"/>
		<reference ref_id="CVE-2023-53487" ref_url="https://www.suse.com/security/cve/CVE-2023-53487/" source="CVE"/>
		<reference ref_id="CVE-2023-53490" ref_url="https://www.suse.com/security/cve/CVE-2023-53490/" source="CVE"/>
		<reference ref_id="CVE-2023-53501" ref_url="https://www.suse.com/security/cve/CVE-2023-53501/" source="CVE"/>
		<reference ref_id="CVE-2023-53513" ref_url="https://www.suse.com/security/cve/CVE-2023-53513/" source="CVE"/>
		<reference ref_id="CVE-2023-53525" ref_url="https://www.suse.com/security/cve/CVE-2023-53525/" source="CVE"/>
		<reference ref_id="CVE-2023-53527" ref_url="https://www.suse.com/security/cve/CVE-2023-53527/" source="CVE"/>
		<reference ref_id="CVE-2023-53530" ref_url="https://www.suse.com/security/cve/CVE-2023-53530/" source="CVE"/>
		<reference ref_id="CVE-2023-53536" ref_url="https://www.suse.com/security/cve/CVE-2023-53536/" source="CVE"/>
		<reference ref_id="CVE-2023-53539" ref_url="https://www.suse.com/security/cve/CVE-2023-53539/" source="CVE"/>
		<reference ref_id="CVE-2023-53544" ref_url="https://www.suse.com/security/cve/CVE-2023-53544/" source="CVE"/>
		<reference ref_id="CVE-2023-53545" ref_url="https://www.suse.com/security/cve/CVE-2023-53545/" source="CVE"/>
		<reference ref_id="CVE-2023-53546" ref_url="https://www.suse.com/security/cve/CVE-2023-53546/" source="CVE"/>
		<reference ref_id="CVE-2023-53547" ref_url="https://www.suse.com/security/cve/CVE-2023-53547/" source="CVE"/>
		<reference ref_id="CVE-2023-53552" ref_url="https://www.suse.com/security/cve/CVE-2023-53552/" source="CVE"/>
		<reference ref_id="CVE-2023-53553" ref_url="https://www.suse.com/security/cve/CVE-2023-53553/" source="CVE"/>
		<reference ref_id="CVE-2023-53559" ref_url="https://www.suse.com/security/cve/CVE-2023-53559/" source="CVE"/>
		<reference ref_id="CVE-2023-53563" ref_url="https://www.suse.com/security/cve/CVE-2023-53563/" source="CVE"/>
		<reference ref_id="CVE-2023-53570" ref_url="https://www.suse.com/security/cve/CVE-2023-53570/" source="CVE"/>
		<reference ref_id="CVE-2023-53577" ref_url="https://www.suse.com/security/cve/CVE-2023-53577/" source="CVE"/>
		<reference ref_id="CVE-2023-53580" ref_url="https://www.suse.com/security/cve/CVE-2023-53580/" source="CVE"/>
		<reference ref_id="CVE-2023-53581" ref_url="https://www.suse.com/security/cve/CVE-2023-53581/" source="CVE"/>
		<reference ref_id="CVE-2023-53585" ref_url="https://www.suse.com/security/cve/CVE-2023-53585/" source="CVE"/>
		<reference ref_id="CVE-2023-53586" ref_url="https://www.suse.com/security/cve/CVE-2023-53586/" source="CVE"/>
		<reference ref_id="CVE-2023-53611" ref_url="https://www.suse.com/security/cve/CVE-2023-53611/" source="CVE"/>
		<reference ref_id="CVE-2023-53612" ref_url="https://www.suse.com/security/cve/CVE-2023-53612/" source="CVE"/>
		<reference ref_id="CVE-2023-53615" ref_url="https://www.suse.com/security/cve/CVE-2023-53615/" source="CVE"/>
		<reference ref_id="CVE-2023-53621" ref_url="https://www.suse.com/security/cve/CVE-2023-53621/" source="CVE"/>
		<reference ref_id="CVE-2023-53628" ref_url="https://www.suse.com/security/cve/CVE-2023-53628/" source="CVE"/>
		<reference ref_id="CVE-2023-53632" ref_url="https://www.suse.com/security/cve/CVE-2023-53632/" source="CVE"/>
		<reference ref_id="CVE-2023-53645" ref_url="https://www.suse.com/security/cve/CVE-2023-53645/" source="CVE"/>
		<reference ref_id="CVE-2023-53646" ref_url="https://www.suse.com/security/cve/CVE-2023-53646/" source="CVE"/>
		<reference ref_id="CVE-2023-53647" ref_url="https://www.suse.com/security/cve/CVE-2023-53647/" source="CVE"/>
		<reference ref_id="CVE-2023-53649" ref_url="https://www.suse.com/security/cve/CVE-2023-53649/" source="CVE"/>
		<reference ref_id="CVE-2023-53652" ref_url="https://www.suse.com/security/cve/CVE-2023-53652/" source="CVE"/>
		<reference ref_id="CVE-2023-53655" ref_url="https://www.suse.com/security/cve/CVE-2023-53655/" source="CVE"/>
		<reference ref_id="CVE-2023-53657" ref_url="https://www.suse.com/security/cve/CVE-2023-53657/" source="CVE"/>
		<reference ref_id="CVE-2023-53660" ref_url="https://www.suse.com/security/cve/CVE-2023-53660/" source="CVE"/>
		<reference ref_id="CVE-2023-53661" ref_url="https://www.suse.com/security/cve/CVE-2023-53661/" source="CVE"/>
		<reference ref_id="CVE-2023-53663" ref_url="https://www.suse.com/security/cve/CVE-2023-53663/" source="CVE"/>
		<reference ref_id="CVE-2023-53664" ref_url="https://www.suse.com/security/cve/CVE-2023-53664/" source="CVE"/>
		<reference ref_id="CVE-2023-53665" ref_url="https://www.suse.com/security/cve/CVE-2023-53665/" source="CVE"/>
		<reference ref_id="CVE-2023-53666" ref_url="https://www.suse.com/security/cve/CVE-2023-53666/" source="CVE"/>
		<reference ref_id="CVE-2023-53673" ref_url="https://www.suse.com/security/cve/CVE-2023-53673/" source="CVE"/>
		<reference ref_id="CVE-2023-53677" ref_url="https://www.suse.com/security/cve/CVE-2023-53677/" source="CVE"/>
		<reference ref_id="CVE-2023-53696" ref_url="https://www.suse.com/security/cve/CVE-2023-53696/" source="CVE"/>
		<reference ref_id="CVE-2023-53709" ref_url="https://www.suse.com/security/cve/CVE-2023-53709/" source="CVE"/>
		<reference ref_id="CVE-2023-53711" ref_url="https://www.suse.com/security/cve/CVE-2023-53711/" source="CVE"/>
		<reference ref_id="CVE-2023-53713" ref_url="https://www.suse.com/security/cve/CVE-2023-53713/" source="CVE"/>
		<reference ref_id="CVE-2023-53722" ref_url="https://www.suse.com/security/cve/CVE-2023-53722/" source="CVE"/>
		<reference ref_id="CVE-2023-53726" ref_url="https://www.suse.com/security/cve/CVE-2023-53726/" source="CVE"/>
		<reference ref_id="CVE-2023-53730" ref_url="https://www.suse.com/security/cve/CVE-2023-53730/" source="CVE"/>
		<reference ref_id="CVE-2023-53743" ref_url="https://www.suse.com/security/cve/CVE-2023-53743/" source="CVE"/>
		<reference ref_id="CVE-2023-53751" ref_url="https://www.suse.com/security/cve/CVE-2023-53751/" source="CVE"/>
		<reference ref_id="CVE-2023-53761" ref_url="https://www.suse.com/security/cve/CVE-2023-53761/" source="CVE"/>
		<reference ref_id="CVE-2023-53762" ref_url="https://www.suse.com/security/cve/CVE-2023-53762/" source="CVE"/>
		<reference ref_id="CVE-2023-53784" ref_url="https://www.suse.com/security/cve/CVE-2023-53784/" source="CVE"/>
		<reference ref_id="CVE-2023-53791" ref_url="https://www.suse.com/security/cve/CVE-2023-53791/" source="CVE"/>
		<reference ref_id="CVE-2023-53795" ref_url="https://www.suse.com/security/cve/CVE-2023-53795/" source="CVE"/>
		<reference ref_id="CVE-2023-53806" ref_url="https://www.suse.com/security/cve/CVE-2023-53806/" source="CVE"/>
		<reference ref_id="CVE-2023-53810" ref_url="https://www.suse.com/security/cve/CVE-2023-53810/" source="CVE"/>
		<reference ref_id="CVE-2023-53813" ref_url="https://www.suse.com/security/cve/CVE-2023-53813/" source="CVE"/>
		<reference ref_id="CVE-2023-53819" ref_url="https://www.suse.com/security/cve/CVE-2023-53819/" source="CVE"/>
		<reference ref_id="CVE-2023-53821" ref_url="https://www.suse.com/security/cve/CVE-2023-53821/" source="CVE"/>
		<reference ref_id="CVE-2023-53823" ref_url="https://www.suse.com/security/cve/CVE-2023-53823/" source="CVE"/>
		<reference ref_id="CVE-2023-53833" ref_url="https://www.suse.com/security/cve/CVE-2023-53833/" source="CVE"/>
		<reference ref_id="CVE-2023-53842" ref_url="https://www.suse.com/security/cve/CVE-2023-53842/" source="CVE"/>
		<reference ref_id="CVE-2023-53843" ref_url="https://www.suse.com/security/cve/CVE-2023-53843/" source="CVE"/>
		<reference ref_id="CVE-2023-53844" ref_url="https://www.suse.com/security/cve/CVE-2023-53844/" source="CVE"/>
		<reference ref_id="CVE-2023-53847" ref_url="https://www.suse.com/security/cve/CVE-2023-53847/" source="CVE"/>
		<reference ref_id="CVE-2023-53848" ref_url="https://www.suse.com/security/cve/CVE-2023-53848/" source="CVE"/>
		<reference ref_id="CVE-2023-53857" ref_url="https://www.suse.com/security/cve/CVE-2023-53857/" source="CVE"/>
		<reference ref_id="CVE-2023-53860" ref_url="https://www.suse.com/security/cve/CVE-2023-53860/" source="CVE"/>
		<reference ref_id="CVE-2023-53863" ref_url="https://www.suse.com/security/cve/CVE-2023-53863/" source="CVE"/>
		<reference ref_id="CVE-2023-53990" ref_url="https://www.suse.com/security/cve/CVE-2023-53990/" source="CVE"/>
		<reference ref_id="CVE-2023-53992" ref_url="https://www.suse.com/security/cve/CVE-2023-53992/" source="CVE"/>
		<reference ref_id="CVE-2023-53993" ref_url="https://www.suse.com/security/cve/CVE-2023-53993/" source="CVE"/>
		<reference ref_id="CVE-2023-53995" ref_url="https://www.suse.com/security/cve/CVE-2023-53995/" source="CVE"/>
		<reference ref_id="CVE-2023-53999" ref_url="https://www.suse.com/security/cve/CVE-2023-53999/" source="CVE"/>
		<reference ref_id="CVE-2023-54003" ref_url="https://www.suse.com/security/cve/CVE-2023-54003/" source="CVE"/>
		<reference ref_id="CVE-2023-54006" ref_url="https://www.suse.com/security/cve/CVE-2023-54006/" source="CVE"/>
		<reference ref_id="CVE-2023-54008" ref_url="https://www.suse.com/security/cve/CVE-2023-54008/" source="CVE"/>
		<reference ref_id="CVE-2023-54014" ref_url="https://www.suse.com/security/cve/CVE-2023-54014/" source="CVE"/>
		<reference ref_id="CVE-2023-54016" ref_url="https://www.suse.com/security/cve/CVE-2023-54016/" source="CVE"/>
		<reference ref_id="CVE-2023-54021" ref_url="https://www.suse.com/security/cve/CVE-2023-54021/" source="CVE"/>
		<reference ref_id="CVE-2023-54022" ref_url="https://www.suse.com/security/cve/CVE-2023-54022/" source="CVE"/>
		<reference ref_id="CVE-2023-54026" ref_url="https://www.suse.com/security/cve/CVE-2023-54026/" source="CVE"/>
		<reference ref_id="CVE-2023-54028" ref_url="https://www.suse.com/security/cve/CVE-2023-54028/" source="CVE"/>
		<reference ref_id="CVE-2023-54030" ref_url="https://www.suse.com/security/cve/CVE-2023-54030/" source="CVE"/>
		<reference ref_id="CVE-2023-54031" ref_url="https://www.suse.com/security/cve/CVE-2023-54031/" source="CVE"/>
		<reference ref_id="CVE-2023-54033" ref_url="https://www.suse.com/security/cve/CVE-2023-54033/" source="CVE"/>
		<reference ref_id="CVE-2023-54035" ref_url="https://www.suse.com/security/cve/CVE-2023-54035/" source="CVE"/>
		<reference ref_id="CVE-2023-54038" ref_url="https://www.suse.com/security/cve/CVE-2023-54038/" source="CVE"/>
		<reference ref_id="CVE-2023-54048" ref_url="https://www.suse.com/security/cve/CVE-2023-54048/" source="CVE"/>
		<reference ref_id="CVE-2023-54052" ref_url="https://www.suse.com/security/cve/CVE-2023-54052/" source="CVE"/>
		<reference ref_id="CVE-2023-54060" ref_url="https://www.suse.com/security/cve/CVE-2023-54060/" source="CVE"/>
		<reference ref_id="CVE-2023-54062" ref_url="https://www.suse.com/security/cve/CVE-2023-54062/" source="CVE"/>
		<reference ref_id="CVE-2023-54064" ref_url="https://www.suse.com/security/cve/CVE-2023-54064/" source="CVE"/>
		<reference ref_id="CVE-2023-54069" ref_url="https://www.suse.com/security/cve/CVE-2023-54069/" source="CVE"/>
		<reference ref_id="CVE-2023-54070" ref_url="https://www.suse.com/security/cve/CVE-2023-54070/" source="CVE"/>
		<reference ref_id="CVE-2023-54072" ref_url="https://www.suse.com/security/cve/CVE-2023-54072/" source="CVE"/>
		<reference ref_id="CVE-2023-54076" ref_url="https://www.suse.com/security/cve/CVE-2023-54076/" source="CVE"/>
		<reference ref_id="CVE-2023-54090" ref_url="https://www.suse.com/security/cve/CVE-2023-54090/" source="CVE"/>
		<reference ref_id="CVE-2023-54091" ref_url="https://www.suse.com/security/cve/CVE-2023-54091/" source="CVE"/>
		<reference ref_id="CVE-2023-54096" ref_url="https://www.suse.com/security/cve/CVE-2023-54096/" source="CVE"/>
		<reference ref_id="CVE-2023-54100" ref_url="https://www.suse.com/security/cve/CVE-2023-54100/" source="CVE"/>
		<reference ref_id="CVE-2023-54106" ref_url="https://www.suse.com/security/cve/CVE-2023-54106/" source="CVE"/>
		<reference ref_id="CVE-2023-54120" ref_url="https://www.suse.com/security/cve/CVE-2023-54120/" source="CVE"/>
		<reference ref_id="CVE-2023-54135" ref_url="https://www.suse.com/security/cve/CVE-2023-54135/" source="CVE"/>
		<reference ref_id="CVE-2023-54137" ref_url="https://www.suse.com/security/cve/CVE-2023-54137/" source="CVE"/>
		<reference ref_id="CVE-2023-54141" ref_url="https://www.suse.com/security/cve/CVE-2023-54141/" source="CVE"/>
		<reference ref_id="CVE-2023-54145" ref_url="https://www.suse.com/security/cve/CVE-2023-54145/" source="CVE"/>
		<reference ref_id="CVE-2023-54148" ref_url="https://www.suse.com/security/cve/CVE-2023-54148/" source="CVE"/>
		<reference ref_id="CVE-2023-54154" ref_url="https://www.suse.com/security/cve/CVE-2023-54154/" source="CVE"/>
		<reference ref_id="CVE-2023-54155" ref_url="https://www.suse.com/security/cve/CVE-2023-54155/" source="CVE"/>
		<reference ref_id="CVE-2023-54156" ref_url="https://www.suse.com/security/cve/CVE-2023-54156/" source="CVE"/>
		<reference ref_id="CVE-2023-54160" ref_url="https://www.suse.com/security/cve/CVE-2023-54160/" source="CVE"/>
		<reference ref_id="CVE-2023-54166" ref_url="https://www.suse.com/security/cve/CVE-2023-54166/" source="CVE"/>
		<reference ref_id="CVE-2023-54169" ref_url="https://www.suse.com/security/cve/CVE-2023-54169/" source="CVE"/>
		<reference ref_id="CVE-2023-54170" ref_url="https://www.suse.com/security/cve/CVE-2023-54170/" source="CVE"/>
		<reference ref_id="CVE-2023-54173" ref_url="https://www.suse.com/security/cve/CVE-2023-54173/" source="CVE"/>
		<reference ref_id="CVE-2023-54179" ref_url="https://www.suse.com/security/cve/CVE-2023-54179/" source="CVE"/>
		<reference ref_id="CVE-2023-54184" ref_url="https://www.suse.com/security/cve/CVE-2023-54184/" source="CVE"/>
		<reference ref_id="CVE-2023-54186" ref_url="https://www.suse.com/security/cve/CVE-2023-54186/" source="CVE"/>
		<reference ref_id="CVE-2023-54197" ref_url="https://www.suse.com/security/cve/CVE-2023-54197/" source="CVE"/>
		<reference ref_id="CVE-2023-54201" ref_url="https://www.suse.com/security/cve/CVE-2023-54201/" source="CVE"/>
		<reference ref_id="CVE-2023-54214" ref_url="https://www.suse.com/security/cve/CVE-2023-54214/" source="CVE"/>
		<reference ref_id="CVE-2023-54215" ref_url="https://www.suse.com/security/cve/CVE-2023-54215/" source="CVE"/>
		<reference ref_id="CVE-2023-54221" ref_url="https://www.suse.com/security/cve/CVE-2023-54221/" source="CVE"/>
		<reference ref_id="CVE-2023-54229" ref_url="https://www.suse.com/security/cve/CVE-2023-54229/" source="CVE"/>
		<reference ref_id="CVE-2023-54235" ref_url="https://www.suse.com/security/cve/CVE-2023-54235/" source="CVE"/>
		<reference ref_id="CVE-2023-54242" ref_url="https://www.suse.com/security/cve/CVE-2023-54242/" source="CVE"/>
		<reference ref_id="CVE-2023-54251" ref_url="https://www.suse.com/security/cve/CVE-2023-54251/" source="CVE"/>
		<reference ref_id="CVE-2023-54254" ref_url="https://www.suse.com/security/cve/CVE-2023-54254/" source="CVE"/>
		<reference ref_id="CVE-2023-54260" ref_url="https://www.suse.com/security/cve/CVE-2023-54260/" source="CVE"/>
		<reference ref_id="CVE-2023-54261" ref_url="https://www.suse.com/security/cve/CVE-2023-54261/" source="CVE"/>
		<reference ref_id="CVE-2023-54263" ref_url="https://www.suse.com/security/cve/CVE-2023-54263/" source="CVE"/>
		<reference ref_id="CVE-2023-54274" ref_url="https://www.suse.com/security/cve/CVE-2023-54274/" source="CVE"/>
		<reference ref_id="CVE-2023-54283" ref_url="https://www.suse.com/security/cve/CVE-2023-54283/" source="CVE"/>
		<reference ref_id="CVE-2023-54289" ref_url="https://www.suse.com/security/cve/CVE-2023-54289/" source="CVE"/>
		<reference ref_id="CVE-2023-54292" ref_url="https://www.suse.com/security/cve/CVE-2023-54292/" source="CVE"/>
		<reference ref_id="CVE-2023-54296" ref_url="https://www.suse.com/security/cve/CVE-2023-54296/" source="CVE"/>
		<reference ref_id="CVE-2023-54302" ref_url="https://www.suse.com/security/cve/CVE-2023-54302/" source="CVE"/>
		<reference ref_id="CVE-2023-54303" ref_url="https://www.suse.com/security/cve/CVE-2023-54303/" source="CVE"/>
		<reference ref_id="CVE-2023-54312" ref_url="https://www.suse.com/security/cve/CVE-2023-54312/" source="CVE"/>
		<reference ref_id="CVE-2023-54316" ref_url="https://www.suse.com/security/cve/CVE-2023-54316/" source="CVE"/>
		<reference ref_id="CVE-2023-54324" ref_url="https://www.suse.com/security/cve/CVE-2023-54324/" source="CVE"/>
		<reference ref_id="CVE-2023-54326" ref_url="https://www.suse.com/security/cve/CVE-2023-54326/" source="CVE"/>
		<reference ref_id="CVE-2023-6040" ref_url="https://www.suse.com/security/cve/CVE-2023-6040/" source="CVE"/>
		<reference ref_id="CVE-2023-6121" ref_url="https://www.suse.com/security/cve/CVE-2023-6121/" source="CVE"/>
		<reference ref_id="CVE-2023-6176" ref_url="https://www.suse.com/security/cve/CVE-2023-6176/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2023-6546" ref_url="https://www.suse.com/security/cve/CVE-2023-6546/" source="CVE"/>
		<reference ref_id="CVE-2023-6622" ref_url="https://www.suse.com/security/cve/CVE-2023-6622/" source="CVE"/>
		<reference ref_id="CVE-2023-6915" ref_url="https://www.suse.com/security/cve/CVE-2023-6915/" source="CVE"/>
		<reference ref_id="CVE-2023-6931" ref_url="https://www.suse.com/security/cve/CVE-2023-6931/" source="CVE"/>
		<reference ref_id="CVE-2023-6932" ref_url="https://www.suse.com/security/cve/CVE-2023-6932/" source="CVE"/>
		<reference ref_id="CVE-2024-0565" ref_url="https://www.suse.com/security/cve/CVE-2024-0565/" source="CVE"/>
		<reference ref_id="CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841/" source="CVE"/>
		<reference ref_id="CVE-2024-1085" ref_url="https://www.suse.com/security/cve/CVE-2024-1085/" source="CVE"/>
		<reference ref_id="CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086/" source="CVE"/>
		<reference ref_id="CVE-2024-25744" ref_url="https://www.suse.com/security/cve/CVE-2024-25744/" source="CVE"/>
		<reference ref_id="CVE-2024-26582" ref_url="https://www.suse.com/security/cve/CVE-2024-26582/" source="CVE"/>
		<reference ref_id="CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583/" source="CVE"/>
		<reference ref_id="CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584/" source="CVE"/>
		<reference ref_id="CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585/" source="CVE"/>
		<reference ref_id="CVE-2024-26586" ref_url="https://www.suse.com/security/cve/CVE-2024-26586/" source="CVE"/>
		<reference ref_id="CVE-2024-26593" ref_url="https://www.suse.com/security/cve/CVE-2024-26593/" source="CVE"/>
		<reference ref_id="CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602/" source="CVE"/>
		<reference ref_id="CVE-2024-26609" ref_url="https://www.suse.com/security/cve/CVE-2024-26609/" source="CVE"/>
		<reference ref_id="CVE-2024-26633" ref_url="https://www.suse.com/security/cve/CVE-2024-26633/" source="CVE"/>
		<reference ref_id="CVE-2024-26649" ref_url="https://www.suse.com/security/cve/CVE-2024-26649/" source="CVE"/>
		<reference ref_id="CVE-2024-26671" ref_url="https://www.suse.com/security/cve/CVE-2024-26671/" source="CVE"/>
		<reference ref_id="CVE-2024-26830" ref_url="https://www.suse.com/security/cve/CVE-2024-26830/" source="CVE"/>
		<reference ref_id="CVE-2025-38053" ref_url="https://www.suse.com/security/cve/CVE-2025-38053/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2394.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2394.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47579/">CVE-2021-47579 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47579">CVE-2021-47579 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0480/">CVE-2022-0480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0480">CVE-2022-0480 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38096/">CVE-2022-38096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38096">CVE-2022-38096 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48632/">CVE-2022-48632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48632">CVE-2022-48632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48947/">CVE-2022-48947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48947">CVE-2022-48947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49011/">CVE-2022-49011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49011">CVE-2022-49011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49322/">CVE-2022-49322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49322">CVE-2022-49322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49350/">CVE-2022-49350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49350">CVE-2022-49350 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49721/">CVE-2022-49721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49721">CVE-2022-49721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49744/">CVE-2022-49744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49744">CVE-2022-49744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49754/">CVE-2022-49754 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49754">CVE-2022-49754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49940/">CVE-2022-49940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49940">CVE-2022-49940 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49977/">CVE-2022-49977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49977">CVE-2022-49977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50080/">CVE-2022-50080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50080">CVE-2022-50080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50116/">CVE-2022-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50116">CVE-2022-50116 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50202/">CVE-2022-50202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50202">CVE-2022-50202 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50277/">CVE-2022-50277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50277">CVE-2022-50277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50286/">CVE-2022-50286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50286">CVE-2022-50286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50313/">CVE-2022-50313 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50313">CVE-2022-50313 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50318/">CVE-2022-50318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50318">CVE-2022-50318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50374/">CVE-2022-50374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50374">CVE-2022-50374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-50377/">CVE-2022-50377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50377">CVE-2022-50377 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50447/">CVE-2022-50447 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50447">CVE-2022-50447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50453/">CVE-2022-50453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50453">CVE-2022-50453 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50485/">CVE-2022-50485 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50485">CVE-2022-50485 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50637/">CVE-2022-50637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50637">CVE-2022-50637 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50638/">CVE-2022-50638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50638">CVE-2022-50638 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50642/">CVE-2022-50642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50642">CVE-2022-50642 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50673/">CVE-2022-50673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50673">CVE-2022-50673 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50736/">CVE-2022-50736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50736">CVE-2022-50736 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50777/">CVE-2022-50777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50777">CVE-2022-50777 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50780/">CVE-2022-50780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50780">CVE-2022-50780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50782/">CVE-2022-50782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50782">CVE-2022-50782 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50845/">CVE-2022-50845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50845">CVE-2022-50845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50879/">CVE-2022-50879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50879">CVE-2022-50879 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24023/">CVE-2023-24023 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24023">CVE-2023-24023 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28464/">CVE-2023-28464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28464">CVE-2023-28464 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28866/">CVE-2023-28866 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28866">CVE-2023-28866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31083/">CVE-2023-31083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31083">CVE-2023-31083 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39194/">CVE-2023-39194 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39198/">CVE-2023-39198 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4133/">CVE-2023-4133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42756/">CVE-2023-42756 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42756">CVE-2023-42756 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45863/">CVE-2023-45863 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46862/">CVE-2023-46862 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51043/">CVE-2023-51043 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51779/">CVE-2023-51779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51780/">CVE-2023-51780 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52434/">CVE-2023-52434 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52434">CVE-2023-52434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52448/">CVE-2023-52448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52450/">CVE-2023-52450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52450">CVE-2023-52450 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52469/">CVE-2023-52469 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52469">CVE-2023-52469 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52470/">CVE-2023-52470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52470">CVE-2023-52470 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52476/">CVE-2023-52476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52478/">CVE-2023-52478 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52486/">CVE-2023-52486 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52486">CVE-2023-52486 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52489/">CVE-2023-52489 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52522/">CVE-2023-52522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52522">CVE-2023-52522 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52529/">CVE-2023-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52529">CVE-2023-52529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52574/">CVE-2023-52574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52578/">CVE-2023-52578 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52578">CVE-2023-52578 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52580/">CVE-2023-52580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52580">CVE-2023-52580 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52581/">CVE-2023-52581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52581">CVE-2023-52581 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52597/">CVE-2023-52597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52610/">CVE-2023-52610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52610">CVE-2023-52610 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52620/">CVE-2023-52620 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52620">CVE-2023-52620 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52628/">CVE-2023-52628 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52628">CVE-2023-52628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52817/">CVE-2023-52817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52817">CVE-2023-52817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52832/">CVE-2023-52832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52832">CVE-2023-52832 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52934/">CVE-2023-52934 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52934">CVE-2023-52934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52939/">CVE-2023-52939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52939">CVE-2023-52939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52940/">CVE-2023-52940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52940">CVE-2023-52940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52973/">CVE-2023-52973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52973">CVE-2023-52973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52976/">CVE-2023-52976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52976">CVE-2023-52976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52984/">CVE-2023-52984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52984">CVE-2023-52984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52985/">CVE-2023-52985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52985">CVE-2023-52985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52999/">CVE-2023-52999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52999">CVE-2023-52999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53004/">CVE-2023-53004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53004">CVE-2023-53004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53016/">CVE-2023-53016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53016">CVE-2023-53016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53017/">CVE-2023-53017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53017">CVE-2023-53017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53018/">CVE-2023-53018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53018">CVE-2023-53018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53019/">CVE-2023-53019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53019">CVE-2023-53019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53046/">CVE-2023-53046 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53046">CVE-2023-53046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53047/">CVE-2023-53047 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53047">CVE-2023-53047 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53052/">CVE-2023-53052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53052">CVE-2023-53052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53057/">CVE-2023-53057 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53057">CVE-2023-53057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53094/">CVE-2023-53094 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53094">CVE-2023-53094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53097/">CVE-2023-53097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53097">CVE-2023-53097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53134/">CVE-2023-53134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53134">CVE-2023-53134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53140/">CVE-2023-53140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53140">CVE-2023-53140 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-53148/">CVE-2023-53148 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53148">CVE-2023-53148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53149/">CVE-2023-53149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53149">CVE-2023-53149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53150/">CVE-2023-53150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53150">CVE-2023-53150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53151/">CVE-2023-53151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53151">CVE-2023-53151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53152/">CVE-2023-53152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53152">CVE-2023-53152 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53164/">CVE-2023-53164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53164">CVE-2023-53164 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53180/">CVE-2023-53180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53180">CVE-2023-53180 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53181/">CVE-2023-53181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53181">CVE-2023-53181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53184/">CVE-2023-53184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53184">CVE-2023-53184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53192/">CVE-2023-53192 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53192">CVE-2023-53192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53193/">CVE-2023-53193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53193">CVE-2023-53193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53202/">CVE-2023-53202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53202">CVE-2023-53202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53204/">CVE-2023-53204 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53204">CVE-2023-53204 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53208/">CVE-2023-53208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53208">CVE-2023-53208 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53209/">CVE-2023-53209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53209">CVE-2023-53209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53210/">CVE-2023-53210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53210">CVE-2023-53210 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53221/">CVE-2023-53221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53221">CVE-2023-53221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53228/">CVE-2023-53228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53228">CVE-2023-53228 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53235/">CVE-2023-53235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53235">CVE-2023-53235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53237/">CVE-2023-53237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53237">CVE-2023-53237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53246/">CVE-2023-53246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53246">CVE-2023-53246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53248/">CVE-2023-53248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53248">CVE-2023-53248 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53252/">CVE-2023-53252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53252">CVE-2023-53252 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53256/">CVE-2023-53256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53256">CVE-2023-53256 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53258/">CVE-2023-53258 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53258">CVE-2023-53258 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53263/">CVE-2023-53263 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53263">CVE-2023-53263 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53270/">CVE-2023-53270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53270">CVE-2023-53270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53275/">CVE-2023-53275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53275">CVE-2023-53275 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53280/">CVE-2023-53280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53280">CVE-2023-53280 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53285/">CVE-2023-53285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53285">CVE-2023-53285 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53288/">CVE-2023-53288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53288">CVE-2023-53288 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53290/">CVE-2023-53290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53290">CVE-2023-53290 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53293/">CVE-2023-53293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53293">CVE-2023-53293 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53297/">CVE-2023-53297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53297">CVE-2023-53297 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53304/">CVE-2023-53304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53304">CVE-2023-53304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53309/">CVE-2023-53309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53309">CVE-2023-53309 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53317/">CVE-2023-53317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53317">CVE-2023-53317 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53321/">CVE-2023-53321 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53321">CVE-2023-53321 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53322/">CVE-2023-53322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53322">CVE-2023-53322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53335/">CVE-2023-53335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53335">CVE-2023-53335 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53338/">CVE-2023-53338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53338">CVE-2023-53338 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53343/">CVE-2023-53343 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53343">CVE-2023-53343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53351/">CVE-2023-53351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53351">CVE-2023-53351 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53352/">CVE-2023-53352 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53352">CVE-2023-53352 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53354/">CVE-2023-53354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53354">CVE-2023-53354 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53365/">CVE-2023-53365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53365">CVE-2023-53365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53370/">CVE-2023-53370 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53370">CVE-2023-53370 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53371/">CVE-2023-53371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53371">CVE-2023-53371 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53380/">CVE-2023-53380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53380">CVE-2023-53380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53384/">CVE-2023-53384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53384">CVE-2023-53384 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53394/">CVE-2023-53394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53394">CVE-2023-53394 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53415/">CVE-2023-53415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53415">CVE-2023-53415 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53421/">CVE-2023-53421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53421">CVE-2023-53421 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53441/">CVE-2023-53441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53441">CVE-2023-53441 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53442/">CVE-2023-53442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53442">CVE-2023-53442 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53444/">CVE-2023-53444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53444">CVE-2023-53444 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53451/">CVE-2023-53451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53451">CVE-2023-53451 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53462/">CVE-2023-53462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53462">CVE-2023-53462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53465/">CVE-2023-53465 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53465">CVE-2023-53465 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53471/">CVE-2023-53471 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53471">CVE-2023-53471 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53473/">CVE-2023-53473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53473">CVE-2023-53473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53476/">CVE-2023-53476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53476">CVE-2023-53476 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53479/">CVE-2023-53479 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53479">CVE-2023-53479 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53487/">CVE-2023-53487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53487">CVE-2023-53487 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53490/">CVE-2023-53490 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53490">CVE-2023-53490 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53501/">CVE-2023-53501 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53501">CVE-2023-53501 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53513/">CVE-2023-53513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53513">CVE-2023-53513 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53525/">CVE-2023-53525 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53525">CVE-2023-53525 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53527/">CVE-2023-53527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53527">CVE-2023-53527 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53530/">CVE-2023-53530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53530">CVE-2023-53530 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53536/">CVE-2023-53536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53536">CVE-2023-53536 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53539/">CVE-2023-53539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53539">CVE-2023-53539 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53544/">CVE-2023-53544 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53544">CVE-2023-53544 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53545/">CVE-2023-53545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53545">CVE-2023-53545 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53546/">CVE-2023-53546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53546">CVE-2023-53546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53547/">CVE-2023-53547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53547">CVE-2023-53547 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53552/">CVE-2023-53552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53552">CVE-2023-53552 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53553/">CVE-2023-53553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53553">CVE-2023-53553 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53559/">CVE-2023-53559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53559">CVE-2023-53559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53563/">CVE-2023-53563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53563">CVE-2023-53563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53570/">CVE-2023-53570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53570">CVE-2023-53570 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53577/">CVE-2023-53577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53577">CVE-2023-53577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53580/">CVE-2023-53580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53580">CVE-2023-53580 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53581/">CVE-2023-53581 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53581">CVE-2023-53581 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53585/">CVE-2023-53585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53585">CVE-2023-53585 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53586/">CVE-2023-53586 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53586">CVE-2023-53586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53611/">CVE-2023-53611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53611">CVE-2023-53611 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53612/">CVE-2023-53612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53612">CVE-2023-53612 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53615/">CVE-2023-53615 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53615">CVE-2023-53615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53621/">CVE-2023-53621 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53621">CVE-2023-53621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53628/">CVE-2023-53628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53628">CVE-2023-53628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53632/">CVE-2023-53632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53632">CVE-2023-53632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53645/">CVE-2023-53645 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53645">CVE-2023-53645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53646/">CVE-2023-53646 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53646">CVE-2023-53646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53647/">CVE-2023-53647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53647">CVE-2023-53647 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-53649/">CVE-2023-53649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53649">CVE-2023-53649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53652/">CVE-2023-53652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53652">CVE-2023-53652 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53655/">CVE-2023-53655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53655">CVE-2023-53655 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53657/">CVE-2023-53657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53657">CVE-2023-53657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53660/">CVE-2023-53660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53660">CVE-2023-53660 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53661/">CVE-2023-53661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53661">CVE-2023-53661 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53663/">CVE-2023-53663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53663">CVE-2023-53663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53664/">CVE-2023-53664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53664">CVE-2023-53664 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53665/">CVE-2023-53665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53665">CVE-2023-53665 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53666/">CVE-2023-53666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53666">CVE-2023-53666 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53673/">CVE-2023-53673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53673">CVE-2023-53673 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53677/">CVE-2023-53677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53677">CVE-2023-53677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53696/">CVE-2023-53696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53696">CVE-2023-53696 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53709/">CVE-2023-53709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53709">CVE-2023-53709 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53711/">CVE-2023-53711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53711">CVE-2023-53711 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53713/">CVE-2023-53713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53713">CVE-2023-53713 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53722/">CVE-2023-53722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53722">CVE-2023-53722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53726/">CVE-2023-53726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53726">CVE-2023-53726 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53730/">CVE-2023-53730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53730">CVE-2023-53730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53743/">CVE-2023-53743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53743">CVE-2023-53743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53751/">CVE-2023-53751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53751">CVE-2023-53751 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53761/">CVE-2023-53761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53761">CVE-2023-53761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53762/">CVE-2023-53762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53762">CVE-2023-53762 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53784/">CVE-2023-53784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53784">CVE-2023-53784 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53791/">CVE-2023-53791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53791">CVE-2023-53791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53795/">CVE-2023-53795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53795">CVE-2023-53795 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53806/">CVE-2023-53806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53806">CVE-2023-53806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53810/">CVE-2023-53810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53810">CVE-2023-53810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53813/">CVE-2023-53813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53813">CVE-2023-53813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53819/">CVE-2023-53819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53819">CVE-2023-53819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53821/">CVE-2023-53821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53821">CVE-2023-53821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53823/">CVE-2023-53823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53823">CVE-2023-53823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53833/">CVE-2023-53833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53833">CVE-2023-53833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53842/">CVE-2023-53842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53842">CVE-2023-53842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53843/">CVE-2023-53843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53843">CVE-2023-53843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53844/">CVE-2023-53844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53844">CVE-2023-53844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53847/">CVE-2023-53847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53847">CVE-2023-53847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53848/">CVE-2023-53848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53848">CVE-2023-53848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53857/">CVE-2023-53857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53857">CVE-2023-53857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53860/">CVE-2023-53860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53860">CVE-2023-53860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53863/">CVE-2023-53863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53863">CVE-2023-53863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53990/">CVE-2023-53990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53990">CVE-2023-53990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53992/">CVE-2023-53992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53992">CVE-2023-53992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53993/">CVE-2023-53993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53993">CVE-2023-53993 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53995/">CVE-2023-53995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53995">CVE-2023-53995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53999/">CVE-2023-53999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53999">CVE-2023-53999 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54003/">CVE-2023-54003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54003">CVE-2023-54003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54006/">CVE-2023-54006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54006">CVE-2023-54006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54008/">CVE-2023-54008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54008">CVE-2023-54008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54014/">CVE-2023-54014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54014">CVE-2023-54014 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54016/">CVE-2023-54016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54016">CVE-2023-54016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54021/">CVE-2023-54021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54021">CVE-2023-54021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54022/">CVE-2023-54022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54022">CVE-2023-54022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54026/">CVE-2023-54026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54026">CVE-2023-54026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54028/">CVE-2023-54028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54028">CVE-2023-54028 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54030/">CVE-2023-54030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54030">CVE-2023-54030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54031/">CVE-2023-54031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54031">CVE-2023-54031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54033/">CVE-2023-54033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54033">CVE-2023-54033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54035/">CVE-2023-54035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54035">CVE-2023-54035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54038/">CVE-2023-54038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54038">CVE-2023-54038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54048/">CVE-2023-54048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54048">CVE-2023-54048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54052/">CVE-2023-54052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54052">CVE-2023-54052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54060/">CVE-2023-54060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54060">CVE-2023-54060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54062/">CVE-2023-54062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54062">CVE-2023-54062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54064/">CVE-2023-54064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54064">CVE-2023-54064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54069/">CVE-2023-54069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54069">CVE-2023-54069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54070/">CVE-2023-54070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54070">CVE-2023-54070 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54072/">CVE-2023-54072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54072">CVE-2023-54072 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54076/">CVE-2023-54076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54076">CVE-2023-54076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54090/">CVE-2023-54090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54090">CVE-2023-54090 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54091/">CVE-2023-54091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54091">CVE-2023-54091 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54096/">CVE-2023-54096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54096">CVE-2023-54096 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54100/">CVE-2023-54100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54100">CVE-2023-54100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54106/">CVE-2023-54106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54106">CVE-2023-54106 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54120/">CVE-2023-54120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54120">CVE-2023-54120 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54135/">CVE-2023-54135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54135">CVE-2023-54135 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54137/">CVE-2023-54137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54137">CVE-2023-54137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54141/">CVE-2023-54141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54141">CVE-2023-54141 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54145/">CVE-2023-54145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54145">CVE-2023-54145 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54148/">CVE-2023-54148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54148">CVE-2023-54148 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54154/">CVE-2023-54154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54154">CVE-2023-54154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54155/">CVE-2023-54155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54155">CVE-2023-54155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54156/">CVE-2023-54156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54156">CVE-2023-54156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54160/">CVE-2023-54160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54160">CVE-2023-54160 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54166/">CVE-2023-54166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54166">CVE-2023-54166 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54169/">CVE-2023-54169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54169">CVE-2023-54169 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54170/">CVE-2023-54170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54170">CVE-2023-54170 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54173/">CVE-2023-54173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54173">CVE-2023-54173 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54179/">CVE-2023-54179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54179">CVE-2023-54179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54184/">CVE-2023-54184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54184">CVE-2023-54184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54186/">CVE-2023-54186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54186">CVE-2023-54186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54197/">CVE-2023-54197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54197">CVE-2023-54197 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54201/">CVE-2023-54201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54201">CVE-2023-54201 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54214/">CVE-2023-54214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54214">CVE-2023-54214 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54215/">CVE-2023-54215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54215">CVE-2023-54215 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54221/">CVE-2023-54221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54221">CVE-2023-54221 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54229/">CVE-2023-54229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54229">CVE-2023-54229 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54235/">CVE-2023-54235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54235">CVE-2023-54235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54242/">CVE-2023-54242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54242">CVE-2023-54242 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54251/">CVE-2023-54251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54251">CVE-2023-54251 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54254/">CVE-2023-54254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54254">CVE-2023-54254 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54260/">CVE-2023-54260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54260">CVE-2023-54260 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54261/">CVE-2023-54261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54261">CVE-2023-54261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54263/">CVE-2023-54263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54263">CVE-2023-54263 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54274/">CVE-2023-54274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54274">CVE-2023-54274 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54283/">CVE-2023-54283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54283">CVE-2023-54283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54289/">CVE-2023-54289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54289">CVE-2023-54289 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54292/">CVE-2023-54292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54292">CVE-2023-54292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54296/">CVE-2023-54296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54296">CVE-2023-54296 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54302/">CVE-2023-54302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54302">CVE-2023-54302 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54303/">CVE-2023-54303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54303">CVE-2023-54303 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54312/">CVE-2023-54312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54312">CVE-2023-54312 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54316/">CVE-2023-54316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54316">CVE-2023-54316 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54324/">CVE-2023-54324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54324">CVE-2023-54324 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54326/">CVE-2023-54326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54326">CVE-2023-54326 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-6040/">CVE-2023-6040 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6040">CVE-2023-6040 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6121/">CVE-2023-6121 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6176/">CVE-2023-6176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6546/">CVE-2023-6546 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6622/">CVE-2023-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6915/">CVE-2023-6915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6931/">CVE-2023-6931 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6932/">CVE-2023-6932 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0565/">CVE-2024-0565 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1085/">CVE-2024-1085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25744/">CVE-2024-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25744">CVE-2024-25744 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26582/">CVE-2024-26582 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26582">CVE-2024-26582 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26586/">CVE-2024-26586 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26593/">CVE-2024-26593 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26609/">CVE-2024-26609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26609">CVE-2024-26609 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26633/">CVE-2024-26633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26633">CVE-2024-26633 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26649/">CVE-2024-26649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26649">CVE-2024-26649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26671/">CVE-2024-26671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26671">CVE-2024-26671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26830/">CVE-2024-26830 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26830">CVE-2024-26830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38053/">CVE-2025-38053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38053">CVE-2025-38053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4207" version="1" class="patch">
	<metadata>
		<title>security update for squashfs-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-40153" ref_url="https://www.suse.com/security/cve/CVE-2021-40153/" source="CVE"/>
		<reference ref_id="CVE-2021-41072" ref_url="https://www.suse.com/security/cve/CVE-2021-41072/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2396.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2396.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40153/">CVE-2021-40153 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40153">CVE-2021-40153 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41072/">CVE-2021-41072 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41072">CVE-2021-41072 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866722" comment="squashfs-tools-4.4-10.git1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4208" version="1" class="patch">
	<metadata>
		<title>security update for harfbuzz (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2410.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2410.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866723" comment="harfbuzz-2.7.4-10.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866724" comment="harfbuzz-devel-2.7.4-10.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866725" comment="harfbuzz-icu-2.7.4-10.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4209" version="1" class="patch">
	<metadata>
		<title>security update for avahi-glib (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-38469" ref_url="https://www.suse.com/security/cve/CVE-2023-38469/" source="CVE"/>
		<reference ref_id="CVE-2023-38470" ref_url="https://www.suse.com/security/cve/CVE-2023-38470/" source="CVE"/>
		<reference ref_id="CVE-2023-38471" ref_url="https://www.suse.com/security/cve/CVE-2023-38471/" source="CVE"/>
		<reference ref_id="CVE-2023-38472" ref_url="https://www.suse.com/security/cve/CVE-2023-38472/" source="CVE"/>
		<reference ref_id="CVE-2023-38473" ref_url="https://www.suse.com/security/cve/CVE-2023-38473/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2433.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2433.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38469/">CVE-2023-38469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38469">CVE-2023-38469 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38470/">CVE-2023-38470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38470">CVE-2023-38470 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38471/">CVE-2023-38471 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38471">CVE-2023-38471 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38472/">CVE-2023-38472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38472">CVE-2023-38472 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38473/">CVE-2023-38473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38473">CVE-2023-38473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866726" comment="avahi-glib-0.8-20.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866727" comment="avahi-tools-0.8-20.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4210" version="1" class="patch">
	<metadata>
		<title>security update for exfatprogs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-45897" ref_url="https://www.suse.com/security/cve/CVE-2023-45897/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2437.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2437.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45897/">CVE-2023-45897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45897">CVE-2023-45897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866728" comment="exfatprogs-1.2.2-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4211" version="1" class="patch">
	<metadata>
		<title>security update for pam (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-22365" ref_url="https://www.suse.com/security/cve/CVE-2024-22365/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2438.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2438.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22365/">CVE-2024-22365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">CVE-2024-22365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866729" comment="pam-1.5.1-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866730" comment="pam-devel-1.5.1-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866731" comment="pam-docs-1.5.1-19.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4212" version="1" class="patch">
	<metadata>
		<title>Low: openssl and openssl-fips-provider security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-2975" ref_url="https://www.suse.com/security/cve/CVE-2023-2975/" source="CVE"/>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<reference ref_id="CVE-2023-6129" ref_url="https://www.suse.com/security/cve/CVE-2023-6129/" source="CVE"/>
		<reference ref_id="CVE-2023-6237" ref_url="https://www.suse.com/security/cve/CVE-2023-6237/" source="CVE"/>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2447. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024-2447.html		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2975/">CVE-2023-2975 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2975">CVE-2023-2975 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6129/">CVE-2023-6129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6129">CVE-2023-6129 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6237/">CVE-2023-6237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6237">CVE-2023-6237 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867976" comment="openssl-3.0.7-27.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867977" comment="openssl-devel-3.0.7-27.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867978" comment="openssl-fips-provider-3.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867979" comment="openssl-libs-3.0.7-27.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867980" comment="openssl-perl-3.0.7-27.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4213" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4692" ref_url="https://www.suse.com/security/cve/CVE-2023-4692/" source="CVE"/>
		<reference ref_id="CVE-2023-4693" ref_url="https://www.suse.com/security/cve/CVE-2023-4693/" source="CVE"/>
		<reference ref_id="CVE-2024-1048" ref_url="https://www.suse.com/security/cve/CVE-2024-1048/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2456.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2456.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4692/">CVE-2023-4692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4693/">CVE-2023-4693 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-1048/">CVE-2024-1048 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1048">CVE-2024-1048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872294" comment="grub2-common-2.06-77.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872295" comment="grub2-efi-x64-2.06-77.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872296" comment="grub2-efi-x64-cdboot-2.06-77.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872297" comment="grub2-efi-x64-modules-2.06-77.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872298" comment="grub2-pc-2.06-77.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872299" comment="grub2-pc-modules-2.06-77.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872300" comment="grub2-tools-2.06-77.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872301" comment="grub2-tools-efi-2.06-77.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872302" comment="grub2-tools-extra-2.06-77.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872303" comment="grub2-tools-minimal-2.06-77.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4214" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-7008" ref_url="https://www.suse.com/security/cve/CVE-2023-7008/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2463.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2463.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-7008/">CVE-2023-7008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7008">CVE-2023-7008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866732" comment="rhel-net-naming-sysattrs-252-32.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866733" comment="systemd-252-32.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866734" comment="systemd-boot-unsigned-252-32.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866735" comment="systemd-container-252-32.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866736" comment="systemd-devel-252-32.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866737" comment="systemd-journal-remote-252-32.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866738" comment="systemd-libs-252-32.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866739" comment="systemd-oomd-252-32.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866740" comment="systemd-pam-252-32.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866741" comment="systemd-resolved-252-32.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866742" comment="systemd-rpm-macros-252-32.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866743" comment="systemd-udev-252-32.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4215" version="1" class="patch">
	<metadata>
		<title>security update for traceroute (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-46316" ref_url="https://www.suse.com/security/cve/CVE-2023-46316/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2483.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2483.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46316/">CVE-2023-46316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866744" comment="traceroute-2.1.0-18.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4216" version="1" class="patch">
	<metadata>
		<title>security update for libssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-6004" ref_url="https://www.suse.com/security/cve/CVE-2023-6004/" source="CVE"/>
		<reference ref_id="CVE-2023-6918" ref_url="https://www.suse.com/security/cve/CVE-2023-6918/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2504.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2504.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6004/">CVE-2023-6004 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6004">CVE-2023-6004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-6918/">CVE-2023-6918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6918">CVE-2023-6918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866745" comment="libssh-0.10.4-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866746" comment="libssh-config-0.10.4-13.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866747" comment="libssh-devel-0.10.4-13.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4217" version="1" class="patch">
	<metadata>
		<title>security update for file (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-48554" ref_url="https://www.suse.com/security/cve/CVE-2022-48554/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2512.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2512.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48554/">CVE-2022-48554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48554">CVE-2022-48554 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866748" comment="file-5.39-16.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866749" comment="file-devel-5.39-16.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866750" comment="file-libs-5.39-16.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866751" comment="python3-file-magic-5.39-16.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4218" version="1" class="patch">
	<metadata>
		<title>security update for wpa_supplicant (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-52160" ref_url="https://www.suse.com/security/cve/CVE-2023-52160/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2517.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2517.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52160/">CVE-2023-52160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52160">CVE-2023-52160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866752" comment="wpa_supplicant-2.10-5.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4219" version="1" class="patch">
	<metadata>
		<title>security update for mingw-pixman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-44638" ref_url="https://www.suse.com/security/cve/CVE-2022-44638/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2525.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2525.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44638/">CVE-2022-44638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44638">CVE-2022-44638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866753" comment="mingw32-pixman-0.42.2-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866754" comment="mingw64-pixman-0.42.2-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4220" version="1" class="patch">
	<metadata>
		<title>security update for mingw-glib2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-29499" ref_url="https://www.suse.com/security/cve/CVE-2023-29499/" source="CVE"/>
		<reference ref_id="CVE-2023-32611" ref_url="https://www.suse.com/security/cve/CVE-2023-32611/" source="CVE"/>
		<reference ref_id="CVE-2023-32636" ref_url="https://www.suse.com/security/cve/CVE-2023-32636/" source="CVE"/>
		<reference ref_id="CVE-2023-32665" ref_url="https://www.suse.com/security/cve/CVE-2023-32665/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2528.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2528.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29499/">CVE-2023-29499 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29499">CVE-2023-29499 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32611/">CVE-2023-32611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32611">CVE-2023-32611 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32636/">CVE-2023-32636 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32636">CVE-2023-32636 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32665/">CVE-2023-32665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32665">CVE-2023-32665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868750" comment="mingw32-glib2-2.78.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868751" comment="mingw32-glib2-static-2.78.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868752" comment="mingw64-glib2-2.78.0-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868753" comment="mingw64-glib2-static-2.78.0-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4221" version="1" class="patch">
	<metadata>
		<title>security update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2548.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2548.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867218" comment="podman-4.9.4-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867219" comment="podman-docker-4.9.4-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867220" comment="podman-plugins-4.9.4-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867221" comment="podman-remote-4.9.4-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867222" comment="podman-tests-4.9.4-3.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4222" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2549.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2549.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868754" comment="skopeo-1.14.3-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868755" comment="skopeo-tests-1.14.3-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4223" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2550.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2550.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866755" comment="buildah-1.33.7-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866756" comment="buildah-tests-1.33.7-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4224" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4408" ref_url="https://www.suse.com/security/cve/CVE-2023-4408/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<reference ref_id="CVE-2023-5517" ref_url="https://www.suse.com/security/cve/CVE-2023-5517/" source="CVE"/>
		<reference ref_id="CVE-2023-5679" ref_url="https://www.suse.com/security/cve/CVE-2023-5679/" source="CVE"/>
		<reference ref_id="CVE-2023-6516" ref_url="https://www.suse.com/security/cve/CVE-2023-6516/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2551.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2551.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4408/">CVE-2023-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4408">CVE-2023-4408 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5517/">CVE-2023-5517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5517">CVE-2023-5517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5679/">CVE-2023-5679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5679">CVE-2023-5679 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6516/">CVE-2023-6516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6516">CVE-2023-6516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867223" comment="bind-9.16.23-18.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867224" comment="bind-chroot-9.16.23-18.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867225" comment="bind-devel-9.16.23-18.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867226" comment="bind-dnssec-doc-9.16.23-18.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867227" comment="bind-dnssec-utils-9.16.23-18.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867228" comment="bind-doc-9.16.23-18.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867229" comment="bind-dyndb-ldap-11.9-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867230" comment="bind-libs-9.16.23-18.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867231" comment="bind-license-9.16.23-18.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867232" comment="bind-utils-9.16.23-18.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867233" comment="python3-bind-9.16.23-18.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4225" version="1" class="patch">
	<metadata>
		<title>security update for python-jwcrypto (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-28102" ref_url="https://www.suse.com/security/cve/CVE-2024-28102/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2559.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2559.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28102/">CVE-2024-28102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28102">CVE-2024-28102 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866757" comment="python3-jwcrypto-0.8-5.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4226" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1441" ref_url="https://www.suse.com/security/cve/CVE-2024-1441/" source="CVE"/>
		<reference ref_id="CVE-2024-2494" ref_url="https://www.suse.com/security/cve/CVE-2024-2494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2560.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2560.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-1441/">CVE-2024-1441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1441">CVE-2024-1441 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2494/">CVE-2024-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2494">CVE-2024-2494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868756" comment="libvirt-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868757" comment="libvirt-client-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868758" comment="libvirt-client-qemu-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868759" comment="libvirt-daemon-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868760" comment="libvirt-daemon-common-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868761" comment="libvirt-daemon-config-network-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868762" comment="libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868763" comment="libvirt-daemon-driver-interface-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868764" comment="libvirt-daemon-driver-network-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868765" comment="libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868766" comment="libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868767" comment="libvirt-daemon-driver-qemu-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868768" comment="libvirt-daemon-driver-secret-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868769" comment="libvirt-daemon-driver-storage-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868770" comment="libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868771" comment="libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868772" comment="libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868773" comment="libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868774" comment="libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868775" comment="libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868776" comment="libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868777" comment="libvirt-daemon-kvm-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868778" comment="libvirt-daemon-lock-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868779" comment="libvirt-daemon-log-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868780" comment="libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868781" comment="libvirt-daemon-plugin-sanlock-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868782" comment="libvirt-daemon-proxy-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868783" comment="libvirt-devel-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868784" comment="libvirt-docs-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868785" comment="libvirt-libs-10.0.0-6.2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868786" comment="libvirt-nss-10.0.0-6.2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4227" version="1" class="patch">
	<metadata>
		<title>security update for golang (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2023-45289" ref_url="https://www.suse.com/security/cve/CVE-2023-45289/" source="CVE"/>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<reference ref_id="CVE-2024-24784" ref_url="https://www.suse.com/security/cve/CVE-2024-24784/" source="CVE"/>
		<reference ref_id="CVE-2024-24785" ref_url="https://www.suse.com/security/cve/CVE-2024-24785/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2562.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2562.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45289/">CVE-2023-45289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24784/">CVE-2024-24784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24785/">CVE-2024-24785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866758" comment="go-toolset-1.21.9-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866759" comment="golang-1.21.9-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866760" comment="golang-bin-1.21.9-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866761" comment="golang-docs-1.21.9-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866762" comment="golang-misc-1.21.9-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866763" comment="golang-src-1.21.9-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866764" comment="golang-tests-1.21.9-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4228" version="1" class="patch">
	<metadata>
		<title>security update for mod_http2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-27316" ref_url="https://www.suse.com/security/cve/CVE-2024-27316/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2564.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2564.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27316/">CVE-2024-27316 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27316">CVE-2024-27316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866765" comment="mod_http2-2.0.26-2.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4229" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2357" ref_url="https://www.suse.com/security/cve/CVE-2024-2357/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2565.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2565.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2357/">CVE-2024-2357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2357">CVE-2024-2357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866766" comment="libreswan-4.12-2.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4230" version="1" class="patch">
	<metadata>
		<title>security update for pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-3019" ref_url="https://www.suse.com/security/cve/CVE-2024-3019/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2566.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2566.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3019/">CVE-2024-3019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3019">CVE-2024-3019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872841" comment="pcp-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872842" comment="pcp-conf-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872843" comment="pcp-devel-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872844" comment="pcp-doc-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872845" comment="pcp-export-pcp2elasticsearch-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872846" comment="pcp-export-pcp2graphite-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872847" comment="pcp-export-pcp2influxdb-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872848" comment="pcp-export-pcp2json-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872849" comment="pcp-export-pcp2spark-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872850" comment="pcp-export-pcp2xml-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872851" comment="pcp-export-pcp2zabbix-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872852" comment="pcp-export-zabbix-agent-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872853" comment="pcp-geolocate-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872854" comment="pcp-gui-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872855" comment="pcp-import-collectl2pcp-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872856" comment="pcp-import-ganglia2pcp-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872857" comment="pcp-import-iostat2pcp-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872858" comment="pcp-import-mrtg2pcp-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872859" comment="pcp-import-sar2pcp-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872860" comment="pcp-libs-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872861" comment="pcp-libs-devel-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872862" comment="pcp-pmda-activemq-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872863" comment="pcp-pmda-apache-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872864" comment="pcp-pmda-bash-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872865" comment="pcp-pmda-bcc-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872866" comment="pcp-pmda-bind2-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872867" comment="pcp-pmda-bonding-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872868" comment="pcp-pmda-bpf-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872869" comment="pcp-pmda-bpftrace-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872870" comment="pcp-pmda-cifs-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872871" comment="pcp-pmda-cisco-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872872" comment="pcp-pmda-dbping-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872873" comment="pcp-pmda-denki-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872874" comment="pcp-pmda-dm-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872875" comment="pcp-pmda-docker-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872876" comment="pcp-pmda-ds389-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872877" comment="pcp-pmda-ds389log-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872878" comment="pcp-pmda-elasticsearch-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872879" comment="pcp-pmda-farm-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872880" comment="pcp-pmda-gfs2-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872881" comment="pcp-pmda-gluster-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872882" comment="pcp-pmda-gpfs-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872883" comment="pcp-pmda-gpsd-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872884" comment="pcp-pmda-hacluster-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872885" comment="pcp-pmda-haproxy-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872886" comment="pcp-pmda-infiniband-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872887" comment="pcp-pmda-json-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872888" comment="pcp-pmda-libvirt-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872889" comment="pcp-pmda-lio-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872890" comment="pcp-pmda-lmsensors-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872891" comment="pcp-pmda-logger-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872892" comment="pcp-pmda-lustre-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872893" comment="pcp-pmda-lustrecomm-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872894" comment="pcp-pmda-mailq-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872895" comment="pcp-pmda-memcache-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872896" comment="pcp-pmda-mic-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872897" comment="pcp-pmda-mongodb-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872898" comment="pcp-pmda-mounts-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872899" comment="pcp-pmda-mssql-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872900" comment="pcp-pmda-mysql-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872901" comment="pcp-pmda-named-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872902" comment="pcp-pmda-netcheck-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872903" comment="pcp-pmda-netfilter-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872904" comment="pcp-pmda-news-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872905" comment="pcp-pmda-nfsclient-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872906" comment="pcp-pmda-nginx-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872907" comment="pcp-pmda-nvidia-gpu-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872908" comment="pcp-pmda-openmetrics-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872909" comment="pcp-pmda-openvswitch-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872910" comment="pcp-pmda-oracle-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872911" comment="pcp-pmda-pdns-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872912" comment="pcp-pmda-perfevent-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872913" comment="pcp-pmda-podman-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872914" comment="pcp-pmda-postfix-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872915" comment="pcp-pmda-postgresql-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872916" comment="pcp-pmda-rabbitmq-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872917" comment="pcp-pmda-redis-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872918" comment="pcp-pmda-resctrl-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872919" comment="pcp-pmda-roomtemp-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872920" comment="pcp-pmda-rsyslog-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872921" comment="pcp-pmda-samba-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872922" comment="pcp-pmda-sendmail-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872923" comment="pcp-pmda-shping-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872924" comment="pcp-pmda-slurm-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872925" comment="pcp-pmda-smart-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872926" comment="pcp-pmda-snmp-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872927" comment="pcp-pmda-sockets-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872928" comment="pcp-pmda-statsd-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872929" comment="pcp-pmda-summary-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872930" comment="pcp-pmda-systemd-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872931" comment="pcp-pmda-trace-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872932" comment="pcp-pmda-unbound-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872933" comment="pcp-pmda-weblog-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872934" comment="pcp-pmda-zimbra-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872935" comment="pcp-pmda-zswap-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872936" comment="pcp-selinux-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872937" comment="pcp-system-tools-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872938" comment="pcp-zeroconf-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872939" comment="perl-PCP-LogImport-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872940" comment="perl-PCP-LogSummary-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872941" comment="perl-PCP-MMV-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872942" comment="perl-PCP-PMDA-6.2.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872943" comment="python3-pcp-6.2.0-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4231" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1313" ref_url="https://www.suse.com/security/cve/CVE-2024-1313/" source="CVE"/>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2568.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2568.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-1313/">CVE-2024-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1313">CVE-2024-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866767" comment="grafana-9.2.10-16.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866768" comment="grafana-selinux-9.2.10-16.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4232" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2569.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2569.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866769" comment="grafana-pcp-5.1.1-2.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4233" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-28834" ref_url="https://www.suse.com/security/cve/CVE-2024-28834/" source="CVE"/>
		<reference ref_id="CVE-2024-28835" ref_url="https://www.suse.com/security/cve/CVE-2024-28835/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2570.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2570.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28834/">CVE-2024-28834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28835/">CVE-2024-28835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28835">CVE-2024-28835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868787" comment="gnutls-3.8.3-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868788" comment="gnutls-c++-3.8.3-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868789" comment="gnutls-dane-3.8.3-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868790" comment="gnutls-devel-3.8.3-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868791" comment="gnutls-utils-3.8.3-4.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4234" version="1" class="patch">
	<metadata>
		<title>security update for sssd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-3758" ref_url="https://www.suse.com/security/cve/CVE-2023-3758/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2571.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2571.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3758/">CVE-2023-3758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-3758">CVE-2023-3758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868954" comment="libipa_hbac-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868955" comment="libsss_autofs-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868956" comment="libsss_certmap-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868957" comment="libsss_idmap-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868958" comment="libsss_nss_idmap-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868959" comment="libsss_nss_idmap-devel-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868960" comment="libsss_simpleifp-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868961" comment="libsss_sudo-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868962" comment="python3-libipa_hbac-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868963" comment="python3-libsss_nss_idmap-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868964" comment="python3-sss-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868965" comment="python3-sss-murmur-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868966" comment="python3-sssdconfig-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868967" comment="sssd-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868968" comment="sssd-ad-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868969" comment="sssd-client-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868970" comment="sssd-common-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868971" comment="sssd-common-pac-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868972" comment="sssd-dbus-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868973" comment="sssd-idp-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868974" comment="sssd-ipa-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868975" comment="sssd-kcm-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868976" comment="sssd-krb5-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868977" comment="sssd-krb5-common-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868978" comment="sssd-ldap-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868979" comment="sssd-nfs-idmap-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868980" comment="sssd-passkey-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868981" comment="sssd-polkit-rules-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868982" comment="sssd-proxy-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868983" comment="sssd-tools-2.9.4-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868984" comment="sssd-winbind-idmap-2.9.4-6.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4235" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2616.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2616.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866770" comment="tigervnc-1.13.1-8.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866771" comment="tigervnc-icons-1.13.1-8.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866772" comment="tigervnc-license-1.13.1-8.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866773" comment="tigervnc-selinux-1.13.1-8.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866774" comment="tigervnc-server-1.13.1-8.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866775" comment="tigervnc-server-minimal-1.13.1-8.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866776" comment="tigervnc-server-module-1.13.1-8.el9_4.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4236" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-25062" ref_url="https://www.suse.com/security/cve/CVE-2024-25062/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2679.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2679.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25062/">CVE-2024-25062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866777" comment="libxml2-2.9.13-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866778" comment="libxml2-devel-2.9.13-6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866779" comment="python3-libxml2-2.9.13-6.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4237" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2023-45289" ref_url="https://www.suse.com/security/cve/CVE-2023-45289/" source="CVE"/>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2724.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2724.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45289/">CVE-2023-45289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866780" comment="git-lfs-3.4.1-2.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4238" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5090" ref_url="https://www.suse.com/security/cve/CVE-2023-5090/" source="CVE"/>
		<reference ref_id="CVE-2023-6240" ref_url="https://www.suse.com/security/cve/CVE-2023-6240/" source="CVE"/>
		<reference ref_id="CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742/" source="CVE"/>
		<reference ref_id="CVE-2024-25743" ref_url="https://www.suse.com/security/cve/CVE-2024-25743/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2758.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2758.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5090/">CVE-2023-5090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5090">CVE-2023-5090 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-6240/">CVE-2023-6240 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6240">CVE-2023-6240 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-25743/">CVE-2024-25743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25743">CVE-2024-25743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009870083" comment="bpftool-7.3.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870084" comment="kernel-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870085" comment="kernel-abi-stablelists-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870086" comment="kernel-core-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870087" comment="kernel-cross-headers-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870088" comment="kernel-debug-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870089" comment="kernel-debug-core-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870092" comment="kernel-debug-modules-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870093" comment="kernel-debug-modules-core-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870094" comment="kernel-debug-modules-extra-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870095" comment="kernel-debug-uki-virt-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870098" comment="kernel-doc-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870099" comment="kernel-headers-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870100" comment="kernel-modules-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870101" comment="kernel-modules-core-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870102" comment="kernel-modules-extra-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870103" comment="kernel-tools-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870104" comment="kernel-tools-libs-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870106" comment="kernel-uki-virt-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870107" comment="libperf-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870108" comment="perf-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870109" comment="python3-perf-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870110" comment="rtla-5.14.0-427.16.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870111" comment="rv-5.14.0-427.16.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4239" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-22025" ref_url="https://www.suse.com/security/cve/CVE-2024-22025/" source="CVE"/>
		<reference ref_id="CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629/" source="CVE"/>
		<reference ref_id="CVE-2024-27982" ref_url="https://www.suse.com/security/cve/CVE-2024-27982/" source="CVE"/>
		<reference ref_id="CVE-2024-27983" ref_url="https://www.suse.com/security/cve/CVE-2024-27983/" source="CVE"/>
		<reference ref_id="CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2779.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2779.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22025/">CVE-2024-22025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22025">CVE-2024-22025 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27982/">CVE-2024-27982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27982">CVE-2024-27982 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27983/">CVE-2024-27983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27983">CVE-2024-27983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868792" comment="nodejs-18.20.2-2.module+el9.4.0+21742+692df1ea is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868793" comment="nodejs-devel-18.20.2-2.module+el9.4.0+21742+692df1ea is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868794" comment="nodejs-docs-18.20.2-2.module+el9.4.0+21742+692df1ea is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868795" comment="nodejs-full-i18n-18.20.2-2.module+el9.4.0+21742+692df1ea is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851983" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0+19762+d716bf3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868796" comment="npm-10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4240" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-30045" ref_url="https://www.suse.com/security/cve/CVE-2024-30045/" source="CVE"/>
		<reference ref_id="CVE-2024-30046" ref_url="https://www.suse.com/security/cve/CVE-2024-30046/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2842.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2842.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30045/">CVE-2024-30045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30045">CVE-2024-30045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30046/">CVE-2024-30046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30046">CVE-2024-30046 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872304" comment="aspnetcore-runtime-8.0-8.0.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872305" comment="aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872306" comment="aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872307" comment="dotnet-apphost-pack-8.0-8.0.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872308" comment="dotnet-host-8.0.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872309" comment="dotnet-hostfxr-8.0-8.0.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872310" comment="dotnet-runtime-8.0-8.0.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872311" comment="dotnet-runtime-dbg-8.0-8.0.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872312" comment="dotnet-sdk-8.0-8.0.105-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872313" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872314" comment="dotnet-sdk-dbg-8.0-8.0.105-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872315" comment="dotnet-targeting-pack-8.0-8.0.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872316" comment="dotnet-templates-8.0-8.0.105-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872317" comment="netstandard-targeting-pack-2.1-8.0.105-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4241" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21386" ref_url="https://www.suse.com/security/cve/CVE-2024-21386/" source="CVE"/>
		<reference ref_id="CVE-2024-21404" ref_url="https://www.suse.com/security/cve/CVE-2024-21404/" source="CVE"/>
		<reference ref_id="CVE-2024-30045" ref_url="https://www.suse.com/security/cve/CVE-2024-30045/" source="CVE"/>
		<reference ref_id="CVE-2024-30046" ref_url="https://www.suse.com/security/cve/CVE-2024-30046/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2843.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2843.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21386/">CVE-2024-21386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21386">CVE-2024-21386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21404/">CVE-2024-21404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21404">CVE-2024-21404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30045/">CVE-2024-30045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30045">CVE-2024-30045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30046/">CVE-2024-30046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30046">CVE-2024-30046 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053980" comment="aspnetcore-runtime-7.0-7.0.19-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053981" comment="aspnetcore-targeting-pack-7.0-7.0.19-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053982" comment="dotnet-apphost-pack-7.0-7.0.19-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053983" comment="dotnet-hostfxr-7.0-7.0.19-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053984" comment="dotnet-runtime-7.0-7.0.19-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053985" comment="dotnet-sdk-7.0-7.0.119-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872318" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053986" comment="dotnet-targeting-pack-7.0-7.0.19-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053987" comment="dotnet-templates-7.0-7.0.119-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4242" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-22025" ref_url="https://www.suse.com/security/cve/CVE-2024-22025/" source="CVE"/>
		<reference ref_id="CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629/" source="CVE"/>
		<reference ref_id="CVE-2024-27982" ref_url="https://www.suse.com/security/cve/CVE-2024-27982/" source="CVE"/>
		<reference ref_id="CVE-2024-27983" ref_url="https://www.suse.com/security/cve/CVE-2024-27983/" source="CVE"/>
		<reference ref_id="CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2853.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2853.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22025/">CVE-2024-22025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22025">CVE-2024-22025 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27982/">CVE-2024-27982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27982">CVE-2024-27982 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27983/">CVE-2024-27983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27983">CVE-2024-27983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868797" comment="nodejs-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868798" comment="nodejs-devel-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868799" comment="nodejs-docs-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868800" comment="nodejs-full-i18n-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868801" comment="npm-10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4243" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367/" source="CVE"/>
		<reference ref_id="CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767/" source="CVE"/>
		<reference ref_id="CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768/" source="CVE"/>
		<reference ref_id="CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769/" source="CVE"/>
		<reference ref_id="CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770/" source="CVE"/>
		<reference ref_id="CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2883.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2883.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009875027" comment="firefox-115.11.0-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875028" comment="firefox-x11-115.11.0-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4244" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367/" source="CVE"/>
		<reference ref_id="CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767/" source="CVE"/>
		<reference ref_id="CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768/" source="CVE"/>
		<reference ref_id="CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769/" source="CVE"/>
		<reference ref_id="CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770/" source="CVE"/>
		<reference ref_id="CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2888.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2888.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875029" comment="thunderbird-115.11.0-1.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4245" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-22025" ref_url="https://www.suse.com/security/cve/CVE-2024-22025/" source="CVE"/>
		<reference ref_id="CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629/" source="CVE"/>
		<reference ref_id="CVE-2024-27982" ref_url="https://www.suse.com/security/cve/CVE-2024-27982/" source="CVE"/>
		<reference ref_id="CVE-2024-27983" ref_url="https://www.suse.com/security/cve/CVE-2024-27983/" source="CVE"/>
		<reference ref_id="CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2910.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2910.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22025/">CVE-2024-22025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22025">CVE-2024-22025 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27982/">CVE-2024-27982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27982">CVE-2024-27982 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27983/">CVE-2024-27983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27983">CVE-2024-27983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866781" comment="nodejs-16.20.2-8.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866782" comment="nodejs-docs-16.20.2-8.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866783" comment="nodejs-full-i18n-16.20.2-8.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866784" comment="nodejs-libs-16.20.2-8.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866785" comment="npm-8.19.4-1.16.20.2.8.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4246" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-26642" ref_url="https://www.suse.com/security/cve/CVE-2024-26642/" source="CVE"/>
		<reference ref_id="CVE-2024-26643" ref_url="https://www.suse.com/security/cve/CVE-2024-26643/" source="CVE"/>
		<reference ref_id="CVE-2024-26673" ref_url="https://www.suse.com/security/cve/CVE-2024-26673/" source="CVE"/>
		<reference ref_id="CVE-2024-26804" ref_url="https://www.suse.com/security/cve/CVE-2024-26804/" source="CVE"/>
		<reference ref_id="CVE-2024-35890" ref_url="https://www.suse.com/security/cve/CVE-2024-35890/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3306.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3306.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26642/">CVE-2024-26642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26643/">CVE-2024-26643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26673/">CVE-2024-26673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26673">CVE-2024-26673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26804/">CVE-2024-26804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26804">CVE-2024-26804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35890/">CVE-2024-35890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35890">CVE-2024-35890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009870112" comment="bpftool-7.3.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870113" comment="kernel-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870114" comment="kernel-abi-stablelists-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870115" comment="kernel-core-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870116" comment="kernel-cross-headers-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870117" comment="kernel-debug-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870118" comment="kernel-debug-core-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870121" comment="kernel-debug-modules-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870122" comment="kernel-debug-modules-core-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870123" comment="kernel-debug-modules-extra-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870124" comment="kernel-debug-uki-virt-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870127" comment="kernel-doc-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870128" comment="kernel-headers-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870129" comment="kernel-modules-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870130" comment="kernel-modules-core-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870131" comment="kernel-modules-extra-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870132" comment="kernel-tools-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870133" comment="kernel-tools-libs-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870135" comment="kernel-uki-virt-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870136" comment="libperf-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870137" comment="perf-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870138" comment="python3-perf-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870139" comment="rtla-5.14.0-427.18.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870140" comment="rv-5.14.0-427.18.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4247" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-23672" ref_url="https://www.suse.com/security/cve/CVE-2024-23672/" source="CVE"/>
		<reference ref_id="CVE-2024-24549" ref_url="https://www.suse.com/security/cve/CVE-2024-24549/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3307.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3307.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23672/">CVE-2024-23672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23672">CVE-2024-23672 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24549/">CVE-2024-24549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24549">CVE-2024-24549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866786" comment="tomcat-9.0.87-1.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866787" comment="tomcat-admin-webapps-9.0.87-1.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866788" comment="tomcat-docs-webapp-9.0.87-1.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866789" comment="tomcat-el-3.0-api-9.0.87-1.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866790" comment="tomcat-jsp-2.3-api-9.0.87-1.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866791" comment="tomcat-lib-9.0.87-1.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866792" comment="tomcat-servlet-4.0-api-9.0.87-1.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866793" comment="tomcat-webapps-9.0.87-1.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4248" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961/" source="CVE"/>
		<reference ref_id="CVE-2024-33599" ref_url="https://www.suse.com/security/cve/CVE-2024-33599/" source="CVE"/>
		<reference ref_id="CVE-2024-33600" ref_url="https://www.suse.com/security/cve/CVE-2024-33600/" source="CVE"/>
		<reference ref_id="CVE-2024-33601" ref_url="https://www.suse.com/security/cve/CVE-2024-33601/" source="CVE"/>
		<reference ref_id="CVE-2024-33602" ref_url="https://www.suse.com/security/cve/CVE-2024-33602/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3339.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3339.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33599/">CVE-2024-33599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33600/">CVE-2024-33600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33601/">CVE-2024-33601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33602/">CVE-2024-33602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866794" comment="glibc-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866795" comment="glibc-all-langpacks-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866796" comment="glibc-benchtests-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866797" comment="glibc-common-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866798" comment="glibc-devel-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866799" comment="glibc-doc-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866800" comment="glibc-gconv-extra-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866801" comment="glibc-headers-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866802" comment="glibc-langpack-aa-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866803" comment="glibc-langpack-af-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866804" comment="glibc-langpack-agr-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866805" comment="glibc-langpack-ak-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866806" comment="glibc-langpack-am-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866807" comment="glibc-langpack-an-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866808" comment="glibc-langpack-anp-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866809" comment="glibc-langpack-ar-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866810" comment="glibc-langpack-as-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866811" comment="glibc-langpack-ast-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866812" comment="glibc-langpack-ayc-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866813" comment="glibc-langpack-az-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866814" comment="glibc-langpack-be-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866815" comment="glibc-langpack-bem-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866816" comment="glibc-langpack-ber-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866817" comment="glibc-langpack-bg-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866818" comment="glibc-langpack-bhb-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866819" comment="glibc-langpack-bho-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866820" comment="glibc-langpack-bi-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866821" comment="glibc-langpack-bn-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866822" comment="glibc-langpack-bo-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866823" comment="glibc-langpack-br-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866824" comment="glibc-langpack-brx-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866825" comment="glibc-langpack-bs-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866826" comment="glibc-langpack-byn-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866827" comment="glibc-langpack-ca-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866828" comment="glibc-langpack-ce-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866829" comment="glibc-langpack-chr-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866830" comment="glibc-langpack-ckb-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866831" comment="glibc-langpack-cmn-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866832" comment="glibc-langpack-crh-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866833" comment="glibc-langpack-cs-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866834" comment="glibc-langpack-csb-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866835" comment="glibc-langpack-cv-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866836" comment="glibc-langpack-cy-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866837" comment="glibc-langpack-da-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866838" comment="glibc-langpack-de-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866839" comment="glibc-langpack-doi-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866840" comment="glibc-langpack-dsb-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866841" comment="glibc-langpack-dv-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866842" comment="glibc-langpack-dz-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866843" comment="glibc-langpack-el-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866844" comment="glibc-langpack-en-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866845" comment="glibc-langpack-eo-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866846" comment="glibc-langpack-es-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866847" comment="glibc-langpack-et-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866848" comment="glibc-langpack-eu-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866849" comment="glibc-langpack-fa-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866850" comment="glibc-langpack-ff-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866851" comment="glibc-langpack-fi-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866852" comment="glibc-langpack-fil-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866853" comment="glibc-langpack-fo-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866854" comment="glibc-langpack-fr-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866855" comment="glibc-langpack-fur-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866856" comment="glibc-langpack-fy-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866857" comment="glibc-langpack-ga-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866858" comment="glibc-langpack-gd-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866859" comment="glibc-langpack-gez-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866860" comment="glibc-langpack-gl-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866861" comment="glibc-langpack-gu-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866862" comment="glibc-langpack-gv-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866863" comment="glibc-langpack-ha-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866864" comment="glibc-langpack-hak-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866865" comment="glibc-langpack-he-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866866" comment="glibc-langpack-hi-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866867" comment="glibc-langpack-hif-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866868" comment="glibc-langpack-hne-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866869" comment="glibc-langpack-hr-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866870" comment="glibc-langpack-hsb-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866871" comment="glibc-langpack-ht-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866872" comment="glibc-langpack-hu-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866873" comment="glibc-langpack-hy-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866874" comment="glibc-langpack-ia-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866875" comment="glibc-langpack-id-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866876" comment="glibc-langpack-ig-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866877" comment="glibc-langpack-ik-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866878" comment="glibc-langpack-is-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866879" comment="glibc-langpack-it-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866880" comment="glibc-langpack-iu-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866881" comment="glibc-langpack-ja-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866882" comment="glibc-langpack-ka-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866883" comment="glibc-langpack-kab-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866884" comment="glibc-langpack-kk-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866885" comment="glibc-langpack-kl-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866886" comment="glibc-langpack-km-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866887" comment="glibc-langpack-kn-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866888" comment="glibc-langpack-ko-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866889" comment="glibc-langpack-kok-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866890" comment="glibc-langpack-ks-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866891" comment="glibc-langpack-ku-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866892" comment="glibc-langpack-kw-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866893" comment="glibc-langpack-ky-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866894" comment="glibc-langpack-lb-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866895" comment="glibc-langpack-lg-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866896" comment="glibc-langpack-li-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866897" comment="glibc-langpack-lij-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866898" comment="glibc-langpack-ln-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866899" comment="glibc-langpack-lo-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866900" comment="glibc-langpack-lt-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866901" comment="glibc-langpack-lv-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866902" comment="glibc-langpack-lzh-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866903" comment="glibc-langpack-mag-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866904" comment="glibc-langpack-mai-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866905" comment="glibc-langpack-mfe-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866906" comment="glibc-langpack-mg-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866907" comment="glibc-langpack-mhr-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866908" comment="glibc-langpack-mi-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866909" comment="glibc-langpack-miq-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866910" comment="glibc-langpack-mjw-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866911" comment="glibc-langpack-mk-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866912" comment="glibc-langpack-ml-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866913" comment="glibc-langpack-mn-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866914" comment="glibc-langpack-mni-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866915" comment="glibc-langpack-mnw-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866916" comment="glibc-langpack-mr-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866917" comment="glibc-langpack-ms-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866918" comment="glibc-langpack-mt-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866919" comment="glibc-langpack-my-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866920" comment="glibc-langpack-nan-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866921" comment="glibc-langpack-nb-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866922" comment="glibc-langpack-nds-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866923" comment="glibc-langpack-ne-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866924" comment="glibc-langpack-nhn-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866925" comment="glibc-langpack-niu-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866926" comment="glibc-langpack-nl-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866927" comment="glibc-langpack-nn-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866928" comment="glibc-langpack-nr-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866929" comment="glibc-langpack-nso-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866930" comment="glibc-langpack-oc-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866931" comment="glibc-langpack-om-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866932" comment="glibc-langpack-or-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866933" comment="glibc-langpack-os-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866934" comment="glibc-langpack-pa-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866935" comment="glibc-langpack-pap-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866936" comment="glibc-langpack-pl-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866937" comment="glibc-langpack-ps-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866938" comment="glibc-langpack-pt-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866939" comment="glibc-langpack-quz-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866940" comment="glibc-langpack-raj-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866941" comment="glibc-langpack-ro-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866942" comment="glibc-langpack-ru-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866943" comment="glibc-langpack-rw-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866944" comment="glibc-langpack-sa-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866945" comment="glibc-langpack-sah-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866946" comment="glibc-langpack-sat-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866947" comment="glibc-langpack-sc-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866948" comment="glibc-langpack-sd-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866949" comment="glibc-langpack-se-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866950" comment="glibc-langpack-sgs-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866951" comment="glibc-langpack-shn-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866952" comment="glibc-langpack-shs-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866953" comment="glibc-langpack-si-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866954" comment="glibc-langpack-sid-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866955" comment="glibc-langpack-sk-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866956" comment="glibc-langpack-sl-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866957" comment="glibc-langpack-sm-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866958" comment="glibc-langpack-so-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866959" comment="glibc-langpack-sq-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866960" comment="glibc-langpack-sr-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866961" comment="glibc-langpack-ss-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866962" comment="glibc-langpack-st-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866963" comment="glibc-langpack-sv-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866964" comment="glibc-langpack-sw-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866965" comment="glibc-langpack-szl-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866966" comment="glibc-langpack-ta-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866967" comment="glibc-langpack-tcy-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866968" comment="glibc-langpack-te-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866969" comment="glibc-langpack-tg-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866970" comment="glibc-langpack-th-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866971" comment="glibc-langpack-the-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866972" comment="glibc-langpack-ti-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866973" comment="glibc-langpack-tig-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866974" comment="glibc-langpack-tk-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866975" comment="glibc-langpack-tl-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866976" comment="glibc-langpack-tn-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866977" comment="glibc-langpack-to-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866978" comment="glibc-langpack-tpi-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866979" comment="glibc-langpack-tr-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866980" comment="glibc-langpack-ts-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866981" comment="glibc-langpack-tt-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866982" comment="glibc-langpack-ug-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866983" comment="glibc-langpack-uk-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866984" comment="glibc-langpack-unm-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866985" comment="glibc-langpack-ur-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866986" comment="glibc-langpack-uz-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866987" comment="glibc-langpack-ve-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866988" comment="glibc-langpack-vi-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866989" comment="glibc-langpack-wa-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866990" comment="glibc-langpack-wae-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866991" comment="glibc-langpack-wal-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866992" comment="glibc-langpack-wo-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866993" comment="glibc-langpack-xh-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866994" comment="glibc-langpack-yi-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866995" comment="glibc-langpack-yo-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866996" comment="glibc-langpack-yue-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866997" comment="glibc-langpack-yuw-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866998" comment="glibc-langpack-zh-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866999" comment="glibc-langpack-zu-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867000" comment="glibc-locale-source-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867001" comment="glibc-minimal-langpack-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867002" comment="glibc-nss-devel-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867003" comment="glibc-static-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867004" comment="glibc-utils-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867005" comment="libnsl-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867006" comment="nscd-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867007" comment="nss_db-2.34-100.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867008" comment="nss_hesiod-2.34-100.el9_4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4249" version="1" class="patch">
	<metadata>
		<title>security update for nghttp2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3501.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3501.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872319" comment="libnghttp2-1.43.0-5.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872320" comment="libnghttp2-devel-1.43.0-5.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872321" comment="nghttp2-1.43.0-5.el9_4.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4250" version="1" class="patch">
	<metadata>
		<title>security update for less (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-32487" ref_url="https://www.suse.com/security/cve/CVE-2024-32487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3513.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3513.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32487/">CVE-2024-32487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867009" comment="less-590-4.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4251" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-26735" ref_url="https://www.suse.com/security/cve/CVE-2024-26735/" source="CVE"/>
		<reference ref_id="CVE-2024-26993" ref_url="https://www.suse.com/security/cve/CVE-2024-26993/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3619.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3619.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26735/">CVE-2024-26735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26735">CVE-2024-26735 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26993/">CVE-2024-26993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26993">CVE-2024-26993 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009870141" comment="bpftool-7.3.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870142" comment="kernel-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870143" comment="kernel-abi-stablelists-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870144" comment="kernel-core-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870145" comment="kernel-cross-headers-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870146" comment="kernel-debug-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870147" comment="kernel-debug-core-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870150" comment="kernel-debug-modules-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870151" comment="kernel-debug-modules-core-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870152" comment="kernel-debug-modules-extra-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870153" comment="kernel-debug-uki-virt-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870156" comment="kernel-doc-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870157" comment="kernel-headers-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870158" comment="kernel-modules-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870159" comment="kernel-modules-core-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870160" comment="kernel-modules-extra-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870161" comment="kernel-tools-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870162" comment="kernel-tools-libs-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870164" comment="kernel-uki-virt-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870165" comment="libperf-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870166" comment="perf-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870167" comment="python3-perf-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870168" comment="rtla-5.14.0-427.20.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870169" comment="rv-5.14.0-427.20.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4252" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-27280" ref_url="https://www.suse.com/security/cve/CVE-2024-27280/" source="CVE"/>
		<reference ref_id="CVE-2024-27281" ref_url="https://www.suse.com/security/cve/CVE-2024-27281/" source="CVE"/>
		<reference ref_id="CVE-2024-27282" ref_url="https://www.suse.com/security/cve/CVE-2024-27282/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3668.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3668.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27280/">CVE-2024-27280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27280">CVE-2024-27280 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27281/">CVE-2024-27281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27281">CVE-2024-27281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27282/">CVE-2024-27282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27282">CVE-2024-27282 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872322" comment="ruby-3.1.5-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872323" comment="ruby-bundled-gems-3.1.5-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872324" comment="ruby-default-gems-3.1.5-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872325" comment="ruby-devel-3.1.5-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872326" comment="ruby-doc-3.1.5-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872327" comment="ruby-libs-3.1.5-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872328" comment="rubygem-bigdecimal-3.1.1-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872329" comment="rubygem-bundler-2.3.27-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872330" comment="rubygem-io-console-0.5.11-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872331" comment="rubygem-irb-1.4.1-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872332" comment="rubygem-json-2.6.1-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872333" comment="rubygem-minitest-5.15.0-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872260" comment="rubygem-mysql2-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872261" comment="rubygem-mysql2-doc-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872262" comment="rubygem-pg-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872263" comment="rubygem-pg-doc-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872334" comment="rubygem-power_assert-2.0.1-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872335" comment="rubygem-psych-4.0.4-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872336" comment="rubygem-rake-13.0.6-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872337" comment="rubygem-rbs-2.7.0-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872338" comment="rubygem-rdoc-6.4.1.1-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872339" comment="rubygem-rexml-3.2.5-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872340" comment="rubygem-rss-0.2.9-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872341" comment="rubygem-test-unit-3.5.3-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872342" comment="rubygem-typeprof-0.21.3-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872343" comment="rubygems-3.3.27-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872344" comment="rubygems-devel-3.3.27-144.module+el9.4.0+21780+79b7bdb5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4253" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-27280" ref_url="https://www.suse.com/security/cve/CVE-2024-27280/" source="CVE"/>
		<reference ref_id="CVE-2024-27281" ref_url="https://www.suse.com/security/cve/CVE-2024-27281/" source="CVE"/>
		<reference ref_id="CVE-2024-27282" ref_url="https://www.suse.com/security/cve/CVE-2024-27282/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3671.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3671.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27280/">CVE-2024-27280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27280">CVE-2024-27280 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27281/">CVE-2024-27281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27281">CVE-2024-27281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27282/">CVE-2024-27282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27282">CVE-2024-27282 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874712" comment="ruby-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874713" comment="ruby-bundled-gems-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874714" comment="ruby-default-gems-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874715" comment="ruby-devel-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874716" comment="ruby-doc-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874717" comment="ruby-libs-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874718" comment="rubygem-bigdecimal-3.1.5-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874719" comment="rubygem-bundler-2.5.9-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874720" comment="rubygem-io-console-0.7.1-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874721" comment="rubygem-irb-1.11.0-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874722" comment="rubygem-json-2.7.1-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874723" comment="rubygem-minitest-5.20.0-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874724" comment="rubygem-mysql2-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874725" comment="rubygem-mysql2-doc-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874728" comment="rubygem-power_assert-2.0.3-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874729" comment="rubygem-psych-5.1.2-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874730" comment="rubygem-racc-1.7.3-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874731" comment="rubygem-rake-13.1.0-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874732" comment="rubygem-rbs-3.4.0-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874733" comment="rubygem-rdoc-6.6.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874734" comment="rubygem-rexml-3.2.6-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874735" comment="rubygem-rss-0.3.0-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874736" comment="rubygem-test-unit-3.6.1-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874737" comment="rubygem-typeprof-0.21.9-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874738" comment="rubygems-3.5.9-2.module+el9.4.0+21859+16f07581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874739" comment="rubygems-devel-3.5.9-2.module+el9.4.0+21859+16f07581 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4254" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2698" ref_url="https://www.suse.com/security/cve/CVE-2024-2698/" source="CVE"/>
		<reference ref_id="CVE-2024-3183" ref_url="https://www.suse.com/security/cve/CVE-2024-3183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3754.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3754.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2698/">CVE-2024-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2698">CVE-2024-2698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3183/">CVE-2024-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3183">CVE-2024-3183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871308" comment="ipa-client-4.11.0-15.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871309" comment="ipa-client-common-4.11.0-15.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871310" comment="ipa-client-epn-4.11.0-15.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871311" comment="ipa-client-samba-4.11.0-15.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871312" comment="ipa-common-4.11.0-15.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871313" comment="ipa-selinux-4.11.0-15.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871314" comment="ipa-server-4.11.0-15.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871315" comment="ipa-server-common-4.11.0-15.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871316" comment="ipa-server-dns-4.11.0-15.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871317" comment="ipa-server-trust-ad-4.11.0-15.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871318" comment="python3-ipaclient-4.11.0-15.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871319" comment="python3-ipalib-4.11.0-15.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871320" comment="python3-ipaserver-4.11.0-15.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871321" comment="python3-ipatests-4.11.0-15.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4255" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34064" ref_url="https://www.suse.com/security/cve/CVE-2024-34064/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3820.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3820.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34064/">CVE-2024-34064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34064">CVE-2024-34064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867010" comment="fence-agents-aliyun-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867011" comment="fence-agents-all-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867012" comment="fence-agents-amt-ws-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867013" comment="fence-agents-apc-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867014" comment="fence-agents-apc-snmp-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867015" comment="fence-agents-aws-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867016" comment="fence-agents-azure-arm-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867017" comment="fence-agents-bladecenter-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867018" comment="fence-agents-brocade-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867019" comment="fence-agents-cisco-mds-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867020" comment="fence-agents-cisco-ucs-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867021" comment="fence-agents-common-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867022" comment="fence-agents-compute-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867023" comment="fence-agents-drac5-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867024" comment="fence-agents-eaton-snmp-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867025" comment="fence-agents-emerson-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867026" comment="fence-agents-eps-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867027" comment="fence-agents-gce-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867028" comment="fence-agents-heuristics-ping-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867029" comment="fence-agents-hpblade-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867030" comment="fence-agents-ibm-powervs-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867031" comment="fence-agents-ibm-vpc-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867032" comment="fence-agents-ibmblade-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867033" comment="fence-agents-ifmib-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867034" comment="fence-agents-ilo-moonshot-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867035" comment="fence-agents-ilo-mp-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867036" comment="fence-agents-ilo-ssh-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867037" comment="fence-agents-ilo2-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867038" comment="fence-agents-intelmodular-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867039" comment="fence-agents-ipdu-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867040" comment="fence-agents-ipmilan-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867041" comment="fence-agents-kdump-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867042" comment="fence-agents-kubevirt-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867043" comment="fence-agents-mpath-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867044" comment="fence-agents-openstack-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867045" comment="fence-agents-redfish-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867046" comment="fence-agents-rhevm-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867047" comment="fence-agents-rsa-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867048" comment="fence-agents-rsb-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867049" comment="fence-agents-sbd-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867050" comment="fence-agents-scsi-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867051" comment="fence-agents-virsh-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867052" comment="fence-agents-vmware-rest-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867053" comment="fence-agents-vmware-soap-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867054" comment="fence-agents-wti-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867055" comment="fence-virt-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867056" comment="fence-virtd-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867057" comment="fence-virtd-cpg-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867058" comment="fence-virtd-libvirt-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867059" comment="fence-virtd-multicast-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867060" comment="fence-virtd-serial-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867061" comment="fence-virtd-tcp-4.10.0-62.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867062" comment="ha-cloud-support-4.10.0-62.el9_4.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4256" version="1" class="patch">
	<metadata>
		<title>security update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-28176" ref_url="https://www.suse.com/security/cve/CVE-2024-28176/" source="CVE"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3826.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3826.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28176/">CVE-2024-28176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28176">CVE-2024-28176 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867234" comment="podman-4.9.4-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867235" comment="podman-docker-4.9.4-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867236" comment="podman-plugins-4.9.4-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867237" comment="podman-remote-4.9.4-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867238" comment="podman-tests-4.9.4-4.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4257" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-28176" ref_url="https://www.suse.com/security/cve/CVE-2024-28176/" source="CVE"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3827.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3827.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28176/">CVE-2024-28176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28176">CVE-2024-28176 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867063" comment="buildah-1.33.7-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867064" comment="buildah-tests-1.33.7-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4258" version="1" class="patch">
	<metadata>
		<title>security update for gvisor-tap-vsock (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3830.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3830.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869921" comment="gvisor-tap-vsock-0.7.3-3.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4259" version="1" class="patch">
	<metadata>
		<title>security update for containernetworking-plugins (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3831.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3831.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872568" comment="containernetworking-plugins-1.4.0-3.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4260" version="1" class="patch">
	<metadata>
		<title>security update for gdk-pixbuf2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-48622" ref_url="https://www.suse.com/security/cve/CVE-2022-48622/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3834.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3834.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48622/">CVE-2022-48622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48622">CVE-2022-48622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871322" comment="gdk-pixbuf2-2.42.6-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871323" comment="gdk-pixbuf2-devel-2.42.6-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871324" comment="gdk-pixbuf2-modules-2.42.6-4.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4261" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2199" ref_url="https://www.suse.com/security/cve/CVE-2024-2199/" source="CVE"/>
		<reference ref_id="CVE-2024-3657" ref_url="https://www.suse.com/security/cve/CVE-2024-3657/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3837.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3837.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2199/">CVE-2024-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2199">CVE-2024-2199 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3657/">CVE-2024-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3657">CVE-2024-3657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867065" comment="389-ds-base-2.4.5-8.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867066" comment="389-ds-base-libs-2.4.5-8.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867067" comment="python3-lib389-2.4.5-8.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4262" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-33621" ref_url="https://www.suse.com/security/cve/CVE-2021-33621/" source="CVE"/>
		<reference ref_id="CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755/" source="CVE"/>
		<reference ref_id="CVE-2023-28756" ref_url="https://www.suse.com/security/cve/CVE-2023-28756/" source="CVE"/>
		<reference ref_id="CVE-2024-27280" ref_url="https://www.suse.com/security/cve/CVE-2024-27280/" source="CVE"/>
		<reference ref_id="CVE-2024-27281" ref_url="https://www.suse.com/security/cve/CVE-2024-27281/" source="CVE"/>
		<reference ref_id="CVE-2024-27282" ref_url="https://www.suse.com/security/cve/CVE-2024-27282/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3838.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3838.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33621/">CVE-2021-33621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33621">CVE-2021-33621 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28756/">CVE-2023-28756 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28756">CVE-2023-28756 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27280/">CVE-2024-27280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27280">CVE-2024-27280 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27281/">CVE-2024-27281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27281">CVE-2024-27281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27282/">CVE-2024-27282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27282">CVE-2024-27282 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872569" comment="ruby-3.0.7-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872570" comment="ruby-default-gems-3.0.7-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872571" comment="ruby-devel-3.0.7-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872572" comment="ruby-doc-3.0.7-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872573" comment="ruby-libs-3.0.7-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872574" comment="rubygem-bigdecimal-3.0.0-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872575" comment="rubygem-bundler-2.2.33-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872576" comment="rubygem-io-console-0.5.7-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872577" comment="rubygem-irb-1.3.5-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872578" comment="rubygem-json-2.5.1-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872579" comment="rubygem-minitest-5.14.2-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872580" comment="rubygem-power_assert-1.2.1-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872581" comment="rubygem-psych-3.3.2-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872582" comment="rubygem-rake-13.0.3-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872583" comment="rubygem-rbs-1.4.0-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872584" comment="rubygem-rdoc-6.3.4.1-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872585" comment="rubygem-rexml-3.2.5-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872586" comment="rubygem-rss-0.2.9-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872587" comment="rubygem-test-unit-3.3.7-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872588" comment="rubygem-typeprof-0.15.2-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872589" comment="rubygems-3.2.33-162.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872590" comment="rubygems-devel-3.2.33-162.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4263" version="1" class="patch">
	<metadata>
		<title>security update for c-ares (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3842.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3842.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009870286" comment="c-ares-1.19.1-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870287" comment="c-ares-devel-1.19.1-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4264" version="1" class="patch">
	<metadata>
		<title>security update for cockpit (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2947" ref_url="https://www.suse.com/security/cve/CVE-2024-2947/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3843.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3843.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2947/">CVE-2024-2947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2947">CVE-2024-2947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871325" comment="cockpit-311.2-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871326" comment="cockpit-bridge-311.2-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871327" comment="cockpit-doc-311.2-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871328" comment="cockpit-packagekit-311.2-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871329" comment="cockpit-pcp-311.2-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871330" comment="cockpit-storaged-311.2-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871331" comment="cockpit-system-311.2-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871332" comment="cockpit-ws-311.2-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4265" version="1" class="patch">
	<metadata>
		<title>security update for python-idna (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-3651" ref_url="https://www.suse.com/security/cve/CVE-2024-3651/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3846.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3846.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3651/">CVE-2024-3651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3651">CVE-2024-3651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867068" comment="python3-idna-2.10-7.el9_4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4266" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688/" source="CVE"/>
		<reference ref_id="CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690/" source="CVE"/>
		<reference ref_id="CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691/" source="CVE"/>
		<reference ref_id="CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693/" source="CVE"/>
		<reference ref_id="CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696/" source="CVE"/>
		<reference ref_id="CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700/" source="CVE"/>
		<reference ref_id="CVE-2024-5702" ref_url="https://www.suse.com/security/cve/CVE-2024-5702/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3955.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3955.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5702/">CVE-2024-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5702">CVE-2024-5702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009869922" comment="firefox-115.12.0-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869923" comment="firefox-x11-115.12.0-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4267" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-32462" ref_url="https://www.suse.com/security/cve/CVE-2024-32462/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3959.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3959.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-32462/">CVE-2024-32462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32462">CVE-2024-32462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009869924" comment="flatpak-1.12.9-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869925" comment="flatpak-devel-1.12.9-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869926" comment="flatpak-libs-1.12.9-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869927" comment="flatpak-selinux-1.12.9-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869928" comment="flatpak-session-helper-1.12.9-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4268" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-33871" ref_url="https://www.suse.com/security/cve/CVE-2024-33871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3999.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3999.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-33871/">CVE-2024-33871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33871">CVE-2024-33871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009869929" comment="ghostscript-9.54.0-16.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869930" comment="ghostscript-doc-9.54.0-16.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869931" comment="ghostscript-tools-dvipdf-9.54.0-16.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869932" comment="ghostscript-tools-fonts-9.54.0-16.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869933" comment="ghostscript-tools-printing-9.54.0-16.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869934" comment="ghostscript-x11-9.54.0-16.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869935" comment="libgs-9.54.0-16.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869936" comment="libgs-devel-9.54.0-16.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4269" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688/" source="CVE"/>
		<reference ref_id="CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690/" source="CVE"/>
		<reference ref_id="CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691/" source="CVE"/>
		<reference ref_id="CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693/" source="CVE"/>
		<reference ref_id="CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696/" source="CVE"/>
		<reference ref_id="CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700/" source="CVE"/>
		<reference ref_id="CVE-2024-5702" ref_url="https://www.suse.com/security/cve/CVE-2024-5702/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4002.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4002.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5702/">CVE-2024-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5702">CVE-2024-5702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869937" comment="thunderbird-115.12.1-1.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4270" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-3652" ref_url="https://www.suse.com/security/cve/CVE-2024-3652/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4050.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4050.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3652/">CVE-2024-3652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3652">CVE-2024-3652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869938" comment="libreswan-4.12-2.el9_4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4271" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4077.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4077.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009869939" comment="python3.11-3.11.7-1.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869940" comment="python3.11-debug-3.11.7-1.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869941" comment="python3.11-devel-3.11.7-1.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869942" comment="python3.11-idle-3.11.7-1.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869943" comment="python3.11-libs-3.11.7-1.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869944" comment="python3.11-test-3.11.7-1.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869945" comment="python3.11-tkinter-3.11.7-1.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4272" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4078.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4078.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009869946" comment="python-unversioned-command-3.9.18-3.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869947" comment="python3-3.9.18-3.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869948" comment="python3-debug-3.9.18-3.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869949" comment="python3-devel-3.9.18-3.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869950" comment="python3-idle-3.9.18-3.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869951" comment="python3-libs-3.9.18-3.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869952" comment="python3-test-3.9.18-3.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869953" comment="python3-tkinter-3.9.18-3.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4273" version="1" class="patch">
	<metadata>
		<title>security update for git (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-32002" ref_url="https://www.suse.com/security/cve/CVE-2024-32002/" source="CVE"/>
		<reference ref_id="CVE-2024-32004" ref_url="https://www.suse.com/security/cve/CVE-2024-32004/" source="CVE"/>
		<reference ref_id="CVE-2024-32020" ref_url="https://www.suse.com/security/cve/CVE-2024-32020/" source="CVE"/>
		<reference ref_id="CVE-2024-32021" ref_url="https://www.suse.com/security/cve/CVE-2024-32021/" source="CVE"/>
		<reference ref_id="CVE-2024-32465" ref_url="https://www.suse.com/security/cve/CVE-2024-32465/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4083.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4083.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32002/">CVE-2024-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32002">CVE-2024-32002 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32004/">CVE-2024-32004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32004">CVE-2024-32004 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32020/">CVE-2024-32020 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32020">CVE-2024-32020 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32021/">CVE-2024-32021 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32021">CVE-2024-32021 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32465/">CVE-2024-32465 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32465">CVE-2024-32465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009869954" comment="git-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869955" comment="git-all-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869956" comment="git-core-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869957" comment="git-core-doc-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869958" comment="git-credential-libsecret-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869959" comment="git-daemon-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869960" comment="git-email-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869961" comment="git-gui-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869962" comment="git-instaweb-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869963" comment="git-subtree-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869964" comment="git-svn-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869965" comment="gitk-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869966" comment="gitweb-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869967" comment="perl-Git-2.43.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869968" comment="perl-Git-SVN-2.43.5-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4274" version="1" class="patch">
	<metadata>
		<title>security update for pki-core (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4727" ref_url="https://www.suse.com/security/cve/CVE-2023-4727/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4165.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4165.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4727/">CVE-2023-4727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4727">CVE-2023-4727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009870170" comment="idm-pki-acme-11.5.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870171" comment="idm-pki-base-11.5.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870172" comment="idm-pki-ca-11.5.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870173" comment="idm-pki-est-11.5.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870174" comment="idm-pki-java-11.5.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870175" comment="idm-pki-kra-11.5.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870176" comment="idm-pki-server-11.5.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870177" comment="idm-pki-tools-11.5.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870178" comment="python3-idm-pki-11.5.0-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4275" version="1" class="patch">
	<metadata>
		<title>security update for golang (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789/" source="CVE"/>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4212.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4212.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871865" comment="go-toolset-1.21.11-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871866" comment="golang-1.21.11-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871867" comment="golang-bin-1.21.11-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871868" comment="golang-docs-1.21.11-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871869" comment="golang-misc-1.21.11-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871870" comment="golang-src-1.21.11-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871871" comment="golang-tests-1.21.11-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4276" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-4467" ref_url="https://www.suse.com/security/cve/CVE-2024-4467/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4278.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4278.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4467/">CVE-2024-4467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4467">CVE-2024-4467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874007" comment="qemu-guest-agent-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874008" comment="qemu-img-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874009" comment="qemu-kvm-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874010" comment="qemu-kvm-audio-pa-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874011" comment="qemu-kvm-block-blkio-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874012" comment="qemu-kvm-block-curl-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874013" comment="qemu-kvm-block-rbd-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874014" comment="qemu-kvm-common-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874015" comment="qemu-kvm-core-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874016" comment="qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874017" comment="qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874018" comment="qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874019" comment="qemu-kvm-device-usb-host-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874020" comment="qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874021" comment="qemu-kvm-docs-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874022" comment="qemu-kvm-tools-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874023" comment="qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874024" comment="qemu-kvm-ui-opengl-8.2.0-11.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874025" comment="qemu-pr-helper-8.2.0-11.el9_4.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4277" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6387" ref_url="https://www.suse.com/security/cve/CVE-2024-6387/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4312.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4312.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6387/">CVE-2024-6387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6387">CVE-2024-6387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871872" comment="openssh-8.7p1-38.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871873" comment="openssh-askpass-8.7p1-38.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871874" comment="openssh-clients-8.7p1-38.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871875" comment="openssh-keycat-8.7p1-38.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871876" comment="openssh-server-8.7p1-38.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871877" comment="pam_ssh_agent_auth-0.10.4-5.38.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4278" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-47400" ref_url="https://www.suse.com/security/cve/CVE-2021-47400/" source="CVE"/>
		<reference ref_id="CVE-2023-52626" ref_url="https://www.suse.com/security/cve/CVE-2023-52626/" source="CVE"/>
		<reference ref_id="CVE-2023-52667" ref_url="https://www.suse.com/security/cve/CVE-2023-52667/" source="CVE"/>
		<reference ref_id="CVE-2024-26801" ref_url="https://www.suse.com/security/cve/CVE-2024-26801/" source="CVE"/>
		<reference ref_id="CVE-2024-26974" ref_url="https://www.suse.com/security/cve/CVE-2024-26974/" source="CVE"/>
		<reference ref_id="CVE-2024-27393" ref_url="https://www.suse.com/security/cve/CVE-2024-27393/" source="CVE"/>
		<reference ref_id="CVE-2024-35870" ref_url="https://www.suse.com/security/cve/CVE-2024-35870/" source="CVE"/>
		<reference ref_id="CVE-2024-35960" ref_url="https://www.suse.com/security/cve/CVE-2024-35960/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4349.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4349.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47400/">CVE-2021-47400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47400">CVE-2021-47400 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52626/">CVE-2023-52626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52626">CVE-2023-52626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52667/">CVE-2023-52667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52667">CVE-2023-52667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26801/">CVE-2024-26801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26801">CVE-2024-26801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26974/">CVE-2024-26974 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26974">CVE-2024-26974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27393/">CVE-2024-27393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27393">CVE-2024-27393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35870/">CVE-2024-35870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35870">CVE-2024-35870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35960/">CVE-2024-35960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35960">CVE-2024-35960 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872944" comment="bpftool-7.3.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872945" comment="kernel-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872946" comment="kernel-abi-stablelists-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872947" comment="kernel-core-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872948" comment="kernel-cross-headers-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872949" comment="kernel-debug-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872950" comment="kernel-debug-core-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872953" comment="kernel-debug-modules-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872954" comment="kernel-debug-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872955" comment="kernel-debug-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872956" comment="kernel-debug-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872959" comment="kernel-doc-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872960" comment="kernel-headers-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872961" comment="kernel-modules-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872962" comment="kernel-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872963" comment="kernel-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872964" comment="kernel-tools-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872965" comment="kernel-tools-libs-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872967" comment="kernel-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872968" comment="libperf-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872969" comment="perf-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872970" comment="python3-perf-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872971" comment="rtla-5.14.0-427.24.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872972" comment="rv-5.14.0-427.24.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4279" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4371.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4371.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874026" comment="buildah-1.33.7-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874027" comment="buildah-tests-1.33.7-3.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4280" version="1" class="patch">
	<metadata>
		<title>security update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4378.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4378.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874028" comment="podman-4.9.4-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874029" comment="podman-docker-4.9.4-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874030" comment="podman-plugins-4.9.4-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874031" comment="podman-remote-4.9.4-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874032" comment="podman-tests-4.9.4-5.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4281" version="1" class="patch">
	<metadata>
		<title>security update for gvisor-tap-vsock (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4379.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4379.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874033" comment="gvisor-tap-vsock-0.7.3-4.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4282" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4422.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4422.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942600" comment="fence-agents-aliyun-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942601" comment="fence-agents-all-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942602" comment="fence-agents-amt-ws-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942603" comment="fence-agents-apc-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942604" comment="fence-agents-apc-snmp-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942605" comment="fence-agents-aws-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942606" comment="fence-agents-azure-arm-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942607" comment="fence-agents-bladecenter-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942608" comment="fence-agents-brocade-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942609" comment="fence-agents-cisco-mds-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942610" comment="fence-agents-cisco-ucs-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875438" comment="fence-agents-common-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875439" comment="fence-agents-compute-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942611" comment="fence-agents-drac5-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942612" comment="fence-agents-eaton-snmp-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942613" comment="fence-agents-emerson-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942614" comment="fence-agents-eps-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942615" comment="fence-agents-gce-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942616" comment="fence-agents-heuristics-ping-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942617" comment="fence-agents-hpblade-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875440" comment="fence-agents-ibm-powervs-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875441" comment="fence-agents-ibm-vpc-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942618" comment="fence-agents-ibmblade-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942619" comment="fence-agents-ifmib-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942620" comment="fence-agents-ilo-moonshot-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942621" comment="fence-agents-ilo-mp-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942622" comment="fence-agents-ilo-ssh-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942623" comment="fence-agents-ilo2-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942624" comment="fence-agents-intelmodular-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942625" comment="fence-agents-ipdu-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942626" comment="fence-agents-ipmilan-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942627" comment="fence-agents-kdump-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875442" comment="fence-agents-kubevirt-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942628" comment="fence-agents-mpath-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942629" comment="fence-agents-openstack-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942630" comment="fence-agents-redfish-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942631" comment="fence-agents-rhevm-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942632" comment="fence-agents-rsa-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942633" comment="fence-agents-rsb-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942634" comment="fence-agents-sbd-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942635" comment="fence-agents-scsi-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875443" comment="fence-agents-virsh-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942636" comment="fence-agents-vmware-rest-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942637" comment="fence-agents-vmware-soap-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942638" comment="fence-agents-wti-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875444" comment="fence-virt-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875445" comment="fence-virtd-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875446" comment="fence-virtd-cpg-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875447" comment="fence-virtd-libvirt-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875448" comment="fence-virtd-multicast-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875449" comment="fence-virtd-serial-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875450" comment="fence-virtd-tcp-4.10.0-62.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942639" comment="ha-cloud-support-4.10.0-62.el9_4.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4283" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-38095" ref_url="https://www.suse.com/security/cve/CVE-2024-38095/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4439.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4439.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38095/">CVE-2024-38095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38095">CVE-2024-38095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009875451" comment="aspnetcore-runtime-6.0-6.0.32-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875452" comment="aspnetcore-targeting-pack-6.0-6.0.32-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875453" comment="dotnet-apphost-pack-6.0-6.0.32-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875454" comment="dotnet-hostfxr-6.0-6.0.32-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875455" comment="dotnet-runtime-6.0-6.0.32-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875456" comment="dotnet-sdk-6.0-6.0.132-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875457" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875458" comment="dotnet-targeting-pack-6.0-6.0.32-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875459" comment="dotnet-templates-6.0-6.0.132-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4284" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-30105" ref_url="https://www.suse.com/security/cve/CVE-2024-30105/" source="CVE"/>
		<reference ref_id="CVE-2024-35264" ref_url="https://www.suse.com/security/cve/CVE-2024-35264/" source="CVE"/>
		<reference ref_id="CVE-2024-38095" ref_url="https://www.suse.com/security/cve/CVE-2024-38095/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4450.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4450.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30105/">CVE-2024-30105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30105">CVE-2024-30105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35264/">CVE-2024-35264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35264">CVE-2024-35264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38095/">CVE-2024-38095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38095">CVE-2024-38095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872973" comment="aspnetcore-runtime-8.0-8.0.7-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872974" comment="aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872975" comment="aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872976" comment="dotnet-apphost-pack-8.0-8.0.7-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872977" comment="dotnet-host-8.0.7-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872978" comment="dotnet-hostfxr-8.0-8.0.7-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872979" comment="dotnet-runtime-8.0-8.0.7-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872980" comment="dotnet-runtime-dbg-8.0-8.0.7-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872981" comment="dotnet-sdk-8.0-8.0.107-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872982" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872983" comment="dotnet-sdk-dbg-8.0-8.0.107-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872984" comment="dotnet-targeting-pack-8.0-8.0.7-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872985" comment="dotnet-templates-8.0-8.0.107-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872986" comment="netstandard-targeting-pack-2.1-8.0.107-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4285" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6409" ref_url="https://www.suse.com/security/cve/CVE-2024-6409/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4457.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4457.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.5/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-6409/">CVE-2024-6409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6409">CVE-2024-6409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872987" comment="openssh-8.7p1-38.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872988" comment="openssh-askpass-8.7p1-38.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872989" comment="openssh-clients-8.7p1-38.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872990" comment="openssh-keycat-8.7p1-38.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872991" comment="openssh-server-8.7p1-38.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872992" comment="pam_ssh_agent_auth-0.10.4-5.38.el9_4.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4286" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6601" ref_url="https://www.suse.com/security/cve/CVE-2024-6601/" source="CVE"/>
		<reference ref_id="CVE-2024-6603" ref_url="https://www.suse.com/security/cve/CVE-2024-6603/" source="CVE"/>
		<reference ref_id="CVE-2024-6604" ref_url="https://www.suse.com/security/cve/CVE-2024-6604/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4500.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4500.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6601/">CVE-2024-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6603/">CVE-2024-6603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6604/">CVE-2024-6604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009875460" comment="firefox-115.13.0-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875461" comment="firefox-x11-115.13.0-3.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4287" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4502.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4502.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872993" comment="skopeo-1.14.3-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872994" comment="skopeo-tests-1.14.3-3.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4288" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4563.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4563.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009876076" comment="java-1.8.0-openjdk-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876077" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876078" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.422.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876079" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.422.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876080" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876081" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876082" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876083" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876084" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876085" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876086" comment="java-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876087" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876088" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876089" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876090" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876091" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876092" comment="java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876093" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876094" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876095" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4289" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4567.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4567.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009876330" comment="java-11-openjdk-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876331" comment="java-11-openjdk-demo-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876332" comment="java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876333" comment="java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876334" comment="java-11-openjdk-devel-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876335" comment="java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876336" comment="java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876337" comment="java-11-openjdk-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876338" comment="java-11-openjdk-headless-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876339" comment="java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876340" comment="java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876341" comment="java-11-openjdk-javadoc-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876342" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876343" comment="java-11-openjdk-jmods-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876344" comment="java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876345" comment="java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876346" comment="java-11-openjdk-slowdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876347" comment="java-11-openjdk-src-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876348" comment="java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876349" comment="java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876350" comment="java-11-openjdk-static-libs-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876351" comment="java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876352" comment="java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4290" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4568.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4568.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009876096" comment="java-17-openjdk-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876097" comment="java-17-openjdk-demo-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876098" comment="java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876099" comment="java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876100" comment="java-17-openjdk-devel-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876101" comment="java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876102" comment="java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876103" comment="java-17-openjdk-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876104" comment="java-17-openjdk-headless-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876105" comment="java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876106" comment="java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876107" comment="java-17-openjdk-javadoc-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876108" comment="java-17-openjdk-javadoc-zip-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876109" comment="java-17-openjdk-jmods-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876110" comment="java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876111" comment="java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876112" comment="java-17-openjdk-slowdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876113" comment="java-17-openjdk-src-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876114" comment="java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876115" comment="java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876116" comment="java-17-openjdk-static-libs-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876117" comment="java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876118" comment="java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4291" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4573.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4573.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874669" comment="java-21-openjdk-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874670" comment="java-21-openjdk-demo-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874671" comment="java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874672" comment="java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874673" comment="java-21-openjdk-devel-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874674" comment="java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874675" comment="java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874676" comment="java-21-openjdk-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874677" comment="java-21-openjdk-headless-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874678" comment="java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874679" comment="java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874680" comment="java-21-openjdk-javadoc-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874681" comment="java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874682" comment="java-21-openjdk-jmods-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874683" comment="java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874684" comment="java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874685" comment="java-21-openjdk-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874686" comment="java-21-openjdk-src-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874687" comment="java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874688" comment="java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874689" comment="java-21-openjdk-static-libs-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874690" comment="java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874691" comment="java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4292" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-47548" ref_url="https://www.suse.com/security/cve/CVE-2021-47548/" source="CVE"/>
		<reference ref_id="CVE-2021-47596" ref_url="https://www.suse.com/security/cve/CVE-2021-47596/" source="CVE"/>
		<reference ref_id="CVE-2022-48627" ref_url="https://www.suse.com/security/cve/CVE-2022-48627/" source="CVE"/>
		<reference ref_id="CVE-2023-52638" ref_url="https://www.suse.com/security/cve/CVE-2023-52638/" source="CVE"/>
		<reference ref_id="CVE-2024-26783" ref_url="https://www.suse.com/security/cve/CVE-2024-26783/" source="CVE"/>
		<reference ref_id="CVE-2024-26858" ref_url="https://www.suse.com/security/cve/CVE-2024-26858/" source="CVE"/>
		<reference ref_id="CVE-2024-27397" ref_url="https://www.suse.com/security/cve/CVE-2024-27397/" source="CVE"/>
		<reference ref_id="CVE-2024-27435" ref_url="https://www.suse.com/security/cve/CVE-2024-27435/" source="CVE"/>
		<reference ref_id="CVE-2024-35958" ref_url="https://www.suse.com/security/cve/CVE-2024-35958/" source="CVE"/>
		<reference ref_id="CVE-2024-36270" ref_url="https://www.suse.com/security/cve/CVE-2024-36270/" source="CVE"/>
		<reference ref_id="CVE-2024-36886" ref_url="https://www.suse.com/security/cve/CVE-2024-36886/" source="CVE"/>
		<reference ref_id="CVE-2024-36904" ref_url="https://www.suse.com/security/cve/CVE-2024-36904/" source="CVE"/>
		<reference ref_id="CVE-2024-36957" ref_url="https://www.suse.com/security/cve/CVE-2024-36957/" source="CVE"/>
		<reference ref_id="CVE-2024-38543" ref_url="https://www.suse.com/security/cve/CVE-2024-38543/" source="CVE"/>
		<reference ref_id="CVE-2024-38586" ref_url="https://www.suse.com/security/cve/CVE-2024-38586/" source="CVE"/>
		<reference ref_id="CVE-2024-38593" ref_url="https://www.suse.com/security/cve/CVE-2024-38593/" source="CVE"/>
		<reference ref_id="CVE-2024-38663" ref_url="https://www.suse.com/security/cve/CVE-2024-38663/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4583.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4583.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47548/">CVE-2021-47548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47548">CVE-2021-47548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47596/">CVE-2021-47596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47596">CVE-2021-47596 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48627/">CVE-2022-48627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48627">CVE-2022-48627 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52638/">CVE-2023-52638 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52638">CVE-2023-52638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26783/">CVE-2024-26783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26783">CVE-2024-26783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26858/">CVE-2024-26858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26858">CVE-2024-26858 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27397/">CVE-2024-27397 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27397">CVE-2024-27397 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27435/">CVE-2024-27435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27435">CVE-2024-27435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35958/">CVE-2024-35958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35958">CVE-2024-35958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36270/">CVE-2024-36270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36270">CVE-2024-36270 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36886/">CVE-2024-36886 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36886">CVE-2024-36886 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36904/">CVE-2024-36904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36957/">CVE-2024-36957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36957">CVE-2024-36957 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38543/">CVE-2024-38543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38543">CVE-2024-38543 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38586/">CVE-2024-38586 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38586">CVE-2024-38586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38593/">CVE-2024-38593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38593">CVE-2024-38593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38663/">CVE-2024-38663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38663">CVE-2024-38663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4293" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtbase (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-39936" ref_url="https://www.suse.com/security/cve/CVE-2024-39936/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4623.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4623.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39936/">CVE-2024-39936 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39936">CVE-2024-39936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874740" comment="qt5-qtbase-5.15.9-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874741" comment="qt5-qtbase-common-5.15.9-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874742" comment="qt5-qtbase-devel-5.15.9-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874743" comment="qt5-qtbase-examples-5.15.9-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874744" comment="qt5-qtbase-gui-5.15.9-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874745" comment="qt5-qtbase-mysql-5.15.9-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874746" comment="qt5-qtbase-odbc-5.15.9-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874747" comment="qt5-qtbase-postgresql-5.15.9-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874748" comment="qt5-qtbase-private-devel-5.15.9-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874749" comment="qt5-qtbase-static-5.15.9-10.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4294" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6601" ref_url="https://www.suse.com/security/cve/CVE-2024-6601/" source="CVE"/>
		<reference ref_id="CVE-2024-6603" ref_url="https://www.suse.com/security/cve/CVE-2024-6603/" source="CVE"/>
		<reference ref_id="CVE-2024-6604" ref_url="https://www.suse.com/security/cve/CVE-2024-6604/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4624.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4624.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6601/">CVE-2024-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6603/">CVE-2024-6603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6604/">CVE-2024-6604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877069" comment="thunderbird-115.13.0-3.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4295" version="1" class="patch">
	<metadata>
		<title>security update for libndp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-5564" ref_url="https://www.suse.com/security/cve/CVE-2024-5564/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4636.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4636.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5564/">CVE-2024-5564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5564">CVE-2024-5564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874750" comment="libndp-1.8-6.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4296" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-38473" ref_url="https://www.suse.com/security/cve/CVE-2024-38473/" source="CVE"/>
		<reference ref_id="CVE-2024-38474" ref_url="https://www.suse.com/security/cve/CVE-2024-38474/" source="CVE"/>
		<reference ref_id="CVE-2024-38475" ref_url="https://www.suse.com/security/cve/CVE-2024-38475/" source="CVE"/>
		<reference ref_id="CVE-2024-38477" ref_url="https://www.suse.com/security/cve/CVE-2024-38477/" source="CVE"/>
		<reference ref_id="CVE-2024-39573" ref_url="https://www.suse.com/security/cve/CVE-2024-39573/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4726.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4726.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-38473/">CVE-2024-38473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38473">CVE-2024-38473 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38474/">CVE-2024-38474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38474">CVE-2024-38474 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38475/">CVE-2024-38475 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38475">CVE-2024-38475 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38477/">CVE-2024-38477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38477">CVE-2024-38477 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39573/">CVE-2024-39573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39573">CVE-2024-39573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009876215" comment="httpd-2.4.57-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876216" comment="httpd-core-2.4.57-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876217" comment="httpd-devel-2.4.57-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876218" comment="httpd-filesystem-2.4.57-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876219" comment="httpd-manual-2.4.57-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876220" comment="httpd-tools-2.4.57-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876221" comment="mod_ldap-2.4.57-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876222" comment="mod_lua-2.4.57-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876223" comment="mod_proxy_html-2.4.57-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876224" comment="mod_session-2.4.57-11.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876225" comment="mod_ssl-2.4.57-11.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4297" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-36765" ref_url="https://www.suse.com/security/cve/CVE-2022-36765/" source="CVE"/>
		<reference ref_id="CVE-2023-45236" ref_url="https://www.suse.com/security/cve/CVE-2023-45236/" source="CVE"/>
		<reference ref_id="CVE-2023-45237" ref_url="https://www.suse.com/security/cve/CVE-2023-45237/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4749.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4749.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36765/">CVE-2022-36765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36765">CVE-2022-36765 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45236/">CVE-2023-45236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45236">CVE-2023-45236 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45237/">CVE-2023-45237 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45237">CVE-2023-45237 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877070" comment="edk2-ovmf-20231122-6.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877071" comment="edk2-tools-20231122-6.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877072" comment="edk2-tools-doc-20231122-6.el9_4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4298" version="1" class="patch">
	<metadata>
		<title>security update for libuv (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24806" ref_url="https://www.suse.com/security/cve/CVE-2024-24806/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4756.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4756.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24806/">CVE-2024-24806 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877073" comment="libuv-1.42.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877074" comment="libuv-devel-1.42.0-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4299" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-4418" ref_url="https://www.suse.com/security/cve/CVE-2024-4418/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4757.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4757.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4418/">CVE-2024-4418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4418">CVE-2024-4418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877075" comment="libvirt-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877076" comment="libvirt-client-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877077" comment="libvirt-client-qemu-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877078" comment="libvirt-daemon-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877079" comment="libvirt-daemon-common-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877080" comment="libvirt-daemon-config-network-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877081" comment="libvirt-daemon-config-nwfilter-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877082" comment="libvirt-daemon-driver-interface-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877083" comment="libvirt-daemon-driver-network-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877084" comment="libvirt-daemon-driver-nodedev-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877085" comment="libvirt-daemon-driver-nwfilter-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877086" comment="libvirt-daemon-driver-qemu-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877087" comment="libvirt-daemon-driver-secret-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877088" comment="libvirt-daemon-driver-storage-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877089" comment="libvirt-daemon-driver-storage-core-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877090" comment="libvirt-daemon-driver-storage-disk-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877091" comment="libvirt-daemon-driver-storage-iscsi-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877092" comment="libvirt-daemon-driver-storage-logical-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877093" comment="libvirt-daemon-driver-storage-mpath-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877094" comment="libvirt-daemon-driver-storage-rbd-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877095" comment="libvirt-daemon-driver-storage-scsi-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877096" comment="libvirt-daemon-kvm-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877097" comment="libvirt-daemon-lock-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877098" comment="libvirt-daemon-log-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877099" comment="libvirt-daemon-plugin-lockd-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877100" comment="libvirt-daemon-plugin-sanlock-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877101" comment="libvirt-daemon-proxy-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877102" comment="libvirt-devel-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877103" comment="libvirt-docs-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877104" comment="libvirt-libs-10.0.0-6.6.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877105" comment="libvirt-nss-10.0.0-6.6.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4300" version="1" class="patch">
	<metadata>
		<title>security update for containernetworking-plugins (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4761.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4761.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877106" comment="containernetworking-plugins-1.4.0-4.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4301" version="1" class="patch">
	<metadata>
		<title>security update for runc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4762.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4762.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877107" comment="runc-1.1.12-3.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4302" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4766.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4766.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877108" comment="python3.11-3.11.7-1.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877109" comment="python3.11-debug-3.11.7-1.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877110" comment="python3.11-devel-3.11.7-1.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877111" comment="python3.11-idle-3.11.7-1.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877112" comment="python3.11-libs-3.11.7-1.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877113" comment="python3.11-test-3.11.7-1.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877114" comment="python3.11-tkinter-3.11.7-1.el9_4.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4303" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-31346" ref_url="https://www.suse.com/security/cve/CVE-2023-31346/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4774.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4774.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-31346/">CVE-2023-31346 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31346">CVE-2023-31346 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877115" comment="iwl100-firmware-39.31.5.1-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877116" comment="iwl1000-firmware-39.31.5.1-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877117" comment="iwl105-firmware-18.168.6.1-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877118" comment="iwl135-firmware-18.168.6.1-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877119" comment="iwl2000-firmware-18.168.6.1-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877120" comment="iwl2030-firmware-18.168.6.1-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877121" comment="iwl3160-firmware-25.30.13.0-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877122" comment="iwl5000-firmware-8.83.5.1_1-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877123" comment="iwl5150-firmware-8.24.2.2-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877124" comment="iwl6000g2a-firmware-18.168.6.1-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877125" comment="iwl6000g2b-firmware-18.168.6.1-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877126" comment="iwl6050-firmware-41.28.5.1-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877127" comment="iwl7260-firmware-25.30.13.0-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877128" comment="libertas-sd8787-firmware-20240603-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877129" comment="linux-firmware-20240603-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877130" comment="linux-firmware-whence-20240603-143.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877131" comment="netronome-firmware-20240603-143.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4304" version="1" class="patch">
	<metadata>
		<title>security update for cups (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-35235" ref_url="https://www.suse.com/security/cve/CVE-2024-35235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4776.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4776.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35235/">CVE-2024-35235 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35235">CVE-2024-35235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877132" comment="cups-2.3.3op2-27.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877133" comment="cups-client-2.3.3op2-27.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877134" comment="cups-devel-2.3.3op2-27.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877135" comment="cups-filesystem-2.3.3op2-27.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877136" comment="cups-ipptool-2.3.3op2-27.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877137" comment="cups-libs-2.3.3op2-27.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877138" comment="cups-lpd-2.3.3op2-27.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877139" comment="cups-printerapp-2.3.3op2-27.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4305" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4779.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4779.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877140" comment="python-unversioned-command-3.9.18-3.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877141" comment="python3-3.9.18-3.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877142" comment="python3-debug-3.9.18-3.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877143" comment="python3-devel-3.9.18-3.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877144" comment="python3-idle-3.9.18-3.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877145" comment="python3-libs-3.9.18-3.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877146" comment="python3-test-3.9.18-3.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877147" comment="python3-tkinter-3.9.18-3.el9_4.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4306" version="1" class="patch">
	<metadata>
		<title>security update for squid (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-23638" ref_url="https://www.suse.com/security/cve/CVE-2024-23638/" source="CVE"/>
		<reference ref_id="CVE-2024-37894" ref_url="https://www.suse.com/security/cve/CVE-2024-37894/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4861.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4861.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23638/">CVE-2024-23638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23638">CVE-2024-23638 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37894/">CVE-2024-37894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37894">CVE-2024-37894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876376" comment="squid-5.5-13.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4307" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-47459" ref_url="https://www.suse.com/security/cve/CVE-2021-47459/" source="CVE"/>
		<reference ref_id="CVE-2022-48743" ref_url="https://www.suse.com/security/cve/CVE-2022-48743/" source="CVE"/>
		<reference ref_id="CVE-2023-52458" ref_url="https://www.suse.com/security/cve/CVE-2023-52458/" source="CVE"/>
		<reference ref_id="CVE-2023-52809" ref_url="https://www.suse.com/security/cve/CVE-2023-52809/" source="CVE"/>
		<reference ref_id="CVE-2024-26737" ref_url="https://www.suse.com/security/cve/CVE-2024-26737/" source="CVE"/>
		<reference ref_id="CVE-2024-26773" ref_url="https://www.suse.com/security/cve/CVE-2024-26773/" source="CVE"/>
		<reference ref_id="CVE-2024-26852" ref_url="https://www.suse.com/security/cve/CVE-2024-26852/" source="CVE"/>
		<reference ref_id="CVE-2024-26880" ref_url="https://www.suse.com/security/cve/CVE-2024-26880/" source="CVE"/>
		<reference ref_id="CVE-2024-26982" ref_url="https://www.suse.com/security/cve/CVE-2024-26982/" source="CVE"/>
		<reference ref_id="CVE-2024-27030" ref_url="https://www.suse.com/security/cve/CVE-2024-27030/" source="CVE"/>
		<reference ref_id="CVE-2024-27046" ref_url="https://www.suse.com/security/cve/CVE-2024-27046/" source="CVE"/>
		<reference ref_id="CVE-2024-35857" ref_url="https://www.suse.com/security/cve/CVE-2024-35857/" source="CVE"/>
		<reference ref_id="CVE-2024-35885" ref_url="https://www.suse.com/security/cve/CVE-2024-35885/" source="CVE"/>
		<reference ref_id="CVE-2024-35907" ref_url="https://www.suse.com/security/cve/CVE-2024-35907/" source="CVE"/>
		<reference ref_id="CVE-2024-35952" ref_url="https://www.suse.com/security/cve/CVE-2024-35952/" source="CVE"/>
		<reference ref_id="CVE-2024-36924" ref_url="https://www.suse.com/security/cve/CVE-2024-36924/" source="CVE"/>
		<reference ref_id="CVE-2024-36952" ref_url="https://www.suse.com/security/cve/CVE-2024-36952/" source="CVE"/>
		<reference ref_id="CVE-2024-38580" ref_url="https://www.suse.com/security/cve/CVE-2024-38580/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4928.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4928.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47459/">CVE-2021-47459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47459">CVE-2021-47459 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48743/">CVE-2022-48743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48743">CVE-2022-48743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52458/">CVE-2023-52458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52458">CVE-2023-52458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52809/">CVE-2023-52809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52809">CVE-2023-52809 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26737/">CVE-2024-26737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26737">CVE-2024-26737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26773/">CVE-2024-26773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26852/">CVE-2024-26852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26852">CVE-2024-26852 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26880/">CVE-2024-26880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26880">CVE-2024-26880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26982/">CVE-2024-26982 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26982">CVE-2024-26982 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27030/">CVE-2024-27030 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27030">CVE-2024-27030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27046/">CVE-2024-27046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27046">CVE-2024-27046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35857/">CVE-2024-35857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35857">CVE-2024-35857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35885/">CVE-2024-35885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35885">CVE-2024-35885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35907/">CVE-2024-35907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35907">CVE-2024-35907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35952/">CVE-2024-35952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35952">CVE-2024-35952 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36924/">CVE-2024-36924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36952/">CVE-2024-36952 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38580/">CVE-2024-38580 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38580">CVE-2024-38580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4308" version="1" class="patch">
	<metadata>
		<title>security update for freeradius (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-3596" ref_url="https://www.suse.com/security/cve/CVE-2024-3596/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4935.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4935.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3596/">CVE-2024-3596 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3596">CVE-2024-3596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877798" comment="freeradius-3.0.21-40.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877799" comment="freeradius-devel-3.0.21-40.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877800" comment="freeradius-doc-3.0.21-40.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877801" comment="freeradius-krb5-3.0.21-40.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877802" comment="freeradius-ldap-3.0.21-40.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877803" comment="freeradius-mysql-3.0.21-40.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877804" comment="freeradius-perl-3.0.21-40.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877805" comment="freeradius-postgresql-3.0.21-40.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877806" comment="freeradius-rest-3.0.21-40.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877807" comment="freeradius-sqlite-3.0.21-40.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877808" comment="freeradius-unixODBC-3.0.21-40.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877809" comment="freeradius-utils-3.0.21-40.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877810" comment="python3-freeradius-3.0.21-40.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4309" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-38476" ref_url="https://www.suse.com/security/cve/CVE-2024-38476/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5138.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5138.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-38476/">CVE-2024-38476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38476">CVE-2024-38476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879110" comment="httpd-2.4.57-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879111" comment="httpd-core-2.4.57-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879112" comment="httpd-devel-2.4.57-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879113" comment="httpd-filesystem-2.4.57-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879114" comment="httpd-manual-2.4.57-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879115" comment="httpd-tools-2.4.57-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879116" comment="mod_ldap-2.4.57-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879117" comment="mod_lua-2.4.57-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879118" comment="mod_proxy_html-2.4.57-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879119" comment="mod_session-2.4.57-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879120" comment="mod_ssl-2.4.57-11.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4310" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-5953" ref_url="https://www.suse.com/security/cve/CVE-2024-5953/" source="CVE"/>
		<reference ref_id="CVE-2024-6237" ref_url="https://www.suse.com/security/cve/CVE-2024-6237/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5192.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5192.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5953/">CVE-2024-5953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5953">CVE-2024-5953 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6237/">CVE-2024-6237 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6237">CVE-2024-6237 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879623" comment="389-ds-base-2.4.5-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879624" comment="389-ds-base-devel-2.4.5-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879625" comment="389-ds-base-libs-2.4.5-9.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879626" comment="python3-lib389-2.4.5-9.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4311" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-1737" ref_url="https://www.suse.com/security/cve/CVE-2024-1737/" source="CVE"/>
		<reference ref_id="CVE-2024-1975" ref_url="https://www.suse.com/security/cve/CVE-2024-1975/" source="CVE"/>
		<reference ref_id="CVE-2024-4076" ref_url="https://www.suse.com/security/cve/CVE-2024-4076/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5231.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5231.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1737/">CVE-2024-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1737">CVE-2024-1737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1975/">CVE-2024-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1975">CVE-2024-1975 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4076/">CVE-2024-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4076">CVE-2024-4076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879121" comment="bind-9.16.23-18.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879122" comment="bind-chroot-9.16.23-18.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879123" comment="bind-devel-9.16.23-18.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879124" comment="bind-dnssec-doc-9.16.23-18.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879125" comment="bind-dnssec-utils-9.16.23-18.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879126" comment="bind-doc-9.16.23-18.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879127" comment="bind-dyndb-ldap-11.9-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879128" comment="bind-libs-9.16.23-18.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879129" comment="bind-license-9.16.23-18.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879130" comment="bind-utils-9.16.23-18.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879131" comment="python3-bind-9.16.23-18.el9_4.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4312" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-setuptools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5279.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5279.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879627" comment="python3.11-setuptools-65.5.1-2.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879628" comment="python3.11-setuptools-wheel-65.5.1-2.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4313" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-7518" ref_url="https://www.suse.com/security/cve/CVE-2024-7518/" source="CVE"/>
		<reference ref_id="CVE-2024-7519" ref_url="https://www.suse.com/security/cve/CVE-2024-7519/" source="CVE"/>
		<reference ref_id="CVE-2024-7520" ref_url="https://www.suse.com/security/cve/CVE-2024-7520/" source="CVE"/>
		<reference ref_id="CVE-2024-7521" ref_url="https://www.suse.com/security/cve/CVE-2024-7521/" source="CVE"/>
		<reference ref_id="CVE-2024-7522" ref_url="https://www.suse.com/security/cve/CVE-2024-7522/" source="CVE"/>
		<reference ref_id="CVE-2024-7524" ref_url="https://www.suse.com/security/cve/CVE-2024-7524/" source="CVE"/>
		<reference ref_id="CVE-2024-7525" ref_url="https://www.suse.com/security/cve/CVE-2024-7525/" source="CVE"/>
		<reference ref_id="CVE-2024-7526" ref_url="https://www.suse.com/security/cve/CVE-2024-7526/" source="CVE"/>
		<reference ref_id="CVE-2024-7527" ref_url="https://www.suse.com/security/cve/CVE-2024-7527/" source="CVE"/>
		<reference ref_id="CVE-2024-7528" ref_url="https://www.suse.com/security/cve/CVE-2024-7528/" source="CVE"/>
		<reference ref_id="CVE-2024-7529" ref_url="https://www.suse.com/security/cve/CVE-2024-7529/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5322.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5322.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-7518/">CVE-2024-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7518">CVE-2024-7518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7519/">CVE-2024-7519 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7520/">CVE-2024-7520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7520">CVE-2024-7520 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7521/">CVE-2024-7521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7522/">CVE-2024-7522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7524/">CVE-2024-7524 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7524">CVE-2024-7524 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7525/">CVE-2024-7525 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7526/">CVE-2024-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7527/">CVE-2024-7527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7528/">CVE-2024-7528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7528">CVE-2024-7528 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-7529/">CVE-2024-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941420" comment="firefox-115.14.0-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941421" comment="firefox-x11-115.14.0-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4314" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-38167" ref_url="https://www.suse.com/security/cve/CVE-2024-38167/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5334.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5334.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38167/">CVE-2024-38167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38167">CVE-2024-38167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881370" comment="aspnetcore-runtime-8.0-8.0.8-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881371" comment="aspnetcore-runtime-dbg-8.0-8.0.8-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881372" comment="aspnetcore-targeting-pack-8.0-8.0.8-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881373" comment="dotnet-apphost-pack-8.0-8.0.8-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881374" comment="dotnet-host-8.0.8-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881375" comment="dotnet-hostfxr-8.0-8.0.8-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881376" comment="dotnet-runtime-8.0-8.0.8-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881377" comment="dotnet-runtime-dbg-8.0-8.0.8-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881378" comment="dotnet-sdk-8.0-8.0.108-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881379" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881380" comment="dotnet-sdk-dbg-8.0-8.0.108-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881381" comment="dotnet-targeting-pack-8.0-8.0.8-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881382" comment="dotnet-templates-8.0-8.0.108-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881383" comment="netstandard-targeting-pack-2.1-8.0.108-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4315" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-47606" ref_url="https://www.suse.com/security/cve/CVE-2021-47606/" source="CVE"/>
		<reference ref_id="CVE-2023-52651" ref_url="https://www.suse.com/security/cve/CVE-2023-52651/" source="CVE"/>
		<reference ref_id="CVE-2023-52796" ref_url="https://www.suse.com/security/cve/CVE-2023-52796/" source="CVE"/>
		<reference ref_id="CVE-2023-52864" ref_url="https://www.suse.com/security/cve/CVE-2023-52864/" source="CVE"/>
		<reference ref_id="CVE-2024-21823" ref_url="https://www.suse.com/security/cve/CVE-2024-21823/" source="CVE"/>
		<reference ref_id="CVE-2024-26600" ref_url="https://www.suse.com/security/cve/CVE-2024-26600/" source="CVE"/>
		<reference ref_id="CVE-2024-26808" ref_url="https://www.suse.com/security/cve/CVE-2024-26808/" source="CVE"/>
		<reference ref_id="CVE-2024-26828" ref_url="https://www.suse.com/security/cve/CVE-2024-26828/" source="CVE"/>
		<reference ref_id="CVE-2024-26853" ref_url="https://www.suse.com/security/cve/CVE-2024-26853/" source="CVE"/>
		<reference ref_id="CVE-2024-26868" ref_url="https://www.suse.com/security/cve/CVE-2024-26868/" source="CVE"/>
		<reference ref_id="CVE-2024-26897" ref_url="https://www.suse.com/security/cve/CVE-2024-26897/" source="CVE"/>
		<reference ref_id="CVE-2024-27049" ref_url="https://www.suse.com/security/cve/CVE-2024-27049/" source="CVE"/>
		<reference ref_id="CVE-2024-27052" ref_url="https://www.suse.com/security/cve/CVE-2024-27052/" source="CVE"/>
		<reference ref_id="CVE-2024-27065" ref_url="https://www.suse.com/security/cve/CVE-2024-27065/" source="CVE"/>
		<reference ref_id="CVE-2024-27417" ref_url="https://www.suse.com/security/cve/CVE-2024-27417/" source="CVE"/>
		<reference ref_id="CVE-2024-27434" ref_url="https://www.suse.com/security/cve/CVE-2024-27434/" source="CVE"/>
		<reference ref_id="CVE-2024-33621" ref_url="https://www.suse.com/security/cve/CVE-2024-33621/" source="CVE"/>
		<reference ref_id="CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789/" source="CVE"/>
		<reference ref_id="CVE-2024-35800" ref_url="https://www.suse.com/security/cve/CVE-2024-35800/" source="CVE"/>
		<reference ref_id="CVE-2024-35823" ref_url="https://www.suse.com/security/cve/CVE-2024-35823/" source="CVE"/>
		<reference ref_id="CVE-2024-35845" ref_url="https://www.suse.com/security/cve/CVE-2024-35845/" source="CVE"/>
		<reference ref_id="CVE-2024-35848" ref_url="https://www.suse.com/security/cve/CVE-2024-35848/" source="CVE"/>
		<reference ref_id="CVE-2024-35852" ref_url="https://www.suse.com/security/cve/CVE-2024-35852/" source="CVE"/>
		<reference ref_id="CVE-2024-35899" ref_url="https://www.suse.com/security/cve/CVE-2024-35899/" source="CVE"/>
		<reference ref_id="CVE-2024-35911" ref_url="https://www.suse.com/security/cve/CVE-2024-35911/" source="CVE"/>
		<reference ref_id="CVE-2024-35937" ref_url="https://www.suse.com/security/cve/CVE-2024-35937/" source="CVE"/>
		<reference ref_id="CVE-2024-35969" ref_url="https://www.suse.com/security/cve/CVE-2024-35969/" source="CVE"/>
		<reference ref_id="CVE-2024-36005" ref_url="https://www.suse.com/security/cve/CVE-2024-36005/" source="CVE"/>
		<reference ref_id="CVE-2024-36017" ref_url="https://www.suse.com/security/cve/CVE-2024-36017/" source="CVE"/>
		<reference ref_id="CVE-2024-36020" ref_url="https://www.suse.com/security/cve/CVE-2024-36020/" source="CVE"/>
		<reference ref_id="CVE-2024-36489" ref_url="https://www.suse.com/security/cve/CVE-2024-36489/" source="CVE"/>
		<reference ref_id="CVE-2024-36903" ref_url="https://www.suse.com/security/cve/CVE-2024-36903/" source="CVE"/>
		<reference ref_id="CVE-2024-36921" ref_url="https://www.suse.com/security/cve/CVE-2024-36921/" source="CVE"/>
		<reference ref_id="CVE-2024-36922" ref_url="https://www.suse.com/security/cve/CVE-2024-36922/" source="CVE"/>
		<reference ref_id="CVE-2024-36929" ref_url="https://www.suse.com/security/cve/CVE-2024-36929/" source="CVE"/>
		<reference ref_id="CVE-2024-36941" ref_url="https://www.suse.com/security/cve/CVE-2024-36941/" source="CVE"/>
		<reference ref_id="CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971/" source="CVE"/>
		<reference ref_id="CVE-2024-37353" ref_url="https://www.suse.com/security/cve/CVE-2024-37353/" source="CVE"/>
		<reference ref_id="CVE-2024-37356" ref_url="https://www.suse.com/security/cve/CVE-2024-37356/" source="CVE"/>
		<reference ref_id="CVE-2024-38391" ref_url="https://www.suse.com/security/cve/CVE-2024-38391/" source="CVE"/>
		<reference ref_id="CVE-2024-38558" ref_url="https://www.suse.com/security/cve/CVE-2024-38558/" source="CVE"/>
		<reference ref_id="CVE-2024-38575" ref_url="https://www.suse.com/security/cve/CVE-2024-38575/" source="CVE"/>
		<reference ref_id="CVE-2024-39487" ref_url="https://www.suse.com/security/cve/CVE-2024-39487/" source="CVE"/>
		<reference ref_id="CVE-2024-40928" ref_url="https://www.suse.com/security/cve/CVE-2024-40928/" source="CVE"/>
		<reference ref_id="CVE-2024-40954" ref_url="https://www.suse.com/security/cve/CVE-2024-40954/" source="CVE"/>
		<reference ref_id="CVE-2024-40958" ref_url="https://www.suse.com/security/cve/CVE-2024-40958/" source="CVE"/>
		<reference ref_id="CVE-2024-40961" ref_url="https://www.suse.com/security/cve/CVE-2024-40961/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5363.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5363.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47606/">CVE-2021-47606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47606">CVE-2021-47606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52651/">CVE-2023-52651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52651">CVE-2023-52651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52796/">CVE-2023-52796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52796">CVE-2023-52796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52864/">CVE-2023-52864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52864">CVE-2023-52864 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-21823/">CVE-2024-21823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21823">CVE-2024-21823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26600/">CVE-2024-26600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26808/">CVE-2024-26808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26808">CVE-2024-26808 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26828/">CVE-2024-26828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26828">CVE-2024-26828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26853/">CVE-2024-26853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26853">CVE-2024-26853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26868/">CVE-2024-26868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26868">CVE-2024-26868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26897/">CVE-2024-26897 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26897">CVE-2024-26897 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27049/">CVE-2024-27049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27049">CVE-2024-27049 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27052/">CVE-2024-27052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27052">CVE-2024-27052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27065/">CVE-2024-27065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27065">CVE-2024-27065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27417/">CVE-2024-27417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27417">CVE-2024-27417 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27434/">CVE-2024-27434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27434">CVE-2024-27434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33621/">CVE-2024-33621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-33621">CVE-2024-33621 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35800/">CVE-2024-35800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35800">CVE-2024-35800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35823/">CVE-2024-35823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35823">CVE-2024-35823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35845/">CVE-2024-35845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35845">CVE-2024-35845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35848/">CVE-2024-35848 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35848">CVE-2024-35848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35852/">CVE-2024-35852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35852">CVE-2024-35852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35899/">CVE-2024-35899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35899">CVE-2024-35899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35911/">CVE-2024-35911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35911">CVE-2024-35911 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35937/">CVE-2024-35937 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35937">CVE-2024-35937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35969/">CVE-2024-35969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35969">CVE-2024-35969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36005/">CVE-2024-36005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36005">CVE-2024-36005 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36017/">CVE-2024-36017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36017">CVE-2024-36017 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36020/">CVE-2024-36020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36020">CVE-2024-36020 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36489/">CVE-2024-36489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36489">CVE-2024-36489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36903/">CVE-2024-36903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36903">CVE-2024-36903 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36921/">CVE-2024-36921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36921">CVE-2024-36921 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36922/">CVE-2024-36922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36922">CVE-2024-36922 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36929/">CVE-2024-36929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36929">CVE-2024-36929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36941/">CVE-2024-36941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-37353/">CVE-2024-37353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37353">CVE-2024-37353 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37356/">CVE-2024-37356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37356">CVE-2024-37356 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38391/">CVE-2024-38391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38391">CVE-2024-38391 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38558/">CVE-2024-38558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38558">CVE-2024-38558 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38575/">CVE-2024-38575 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38575">CVE-2024-38575 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39487/">CVE-2024-39487 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39487">CVE-2024-39487 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40928/">CVE-2024-40928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40928">CVE-2024-40928 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40954/">CVE-2024-40954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40958/">CVE-2024-40958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40958">CVE-2024-40958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40961/">CVE-2024-40961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40961">CVE-2024-40961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4316" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-7518" ref_url="https://www.suse.com/security/cve/CVE-2024-7518/" source="CVE"/>
		<reference ref_id="CVE-2024-7519" ref_url="https://www.suse.com/security/cve/CVE-2024-7519/" source="CVE"/>
		<reference ref_id="CVE-2024-7520" ref_url="https://www.suse.com/security/cve/CVE-2024-7520/" source="CVE"/>
		<reference ref_id="CVE-2024-7521" ref_url="https://www.suse.com/security/cve/CVE-2024-7521/" source="CVE"/>
		<reference ref_id="CVE-2024-7522" ref_url="https://www.suse.com/security/cve/CVE-2024-7522/" source="CVE"/>
		<reference ref_id="CVE-2024-7525" ref_url="https://www.suse.com/security/cve/CVE-2024-7525/" source="CVE"/>
		<reference ref_id="CVE-2024-7526" ref_url="https://www.suse.com/security/cve/CVE-2024-7526/" source="CVE"/>
		<reference ref_id="CVE-2024-7527" ref_url="https://www.suse.com/security/cve/CVE-2024-7527/" source="CVE"/>
		<reference ref_id="CVE-2024-7528" ref_url="https://www.suse.com/security/cve/CVE-2024-7528/" source="CVE"/>
		<reference ref_id="CVE-2024-7529" ref_url="https://www.suse.com/security/cve/CVE-2024-7529/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5392.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5392.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-7518/">CVE-2024-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7518">CVE-2024-7518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7519/">CVE-2024-7519 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7520/">CVE-2024-7520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7520">CVE-2024-7520 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7521/">CVE-2024-7521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7522/">CVE-2024-7522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7525/">CVE-2024-7525 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7526/">CVE-2024-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7527/">CVE-2024-7527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7528/">CVE-2024-7528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7528">CVE-2024-7528 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-7529/">CVE-2024-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881384" comment="thunderbird-115.14.0-1.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4317" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2398" ref_url="https://www.suse.com/security/cve/CVE-2024-2398/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5529.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5529.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2398/">CVE-2024-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2398">CVE-2024-2398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880234" comment="curl-7.76.1-29.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880235" comment="curl-minimal-7.76.1-29.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880236" comment="libcurl-7.76.1-29.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880237" comment="libcurl-devel-7.76.1-29.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880238" comment="libcurl-minimal-7.76.1-29.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4318" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-setuptools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5533.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5533.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880239" comment="python3.12-setuptools-68.2.2-3.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880240" comment="python3.12-setuptools-wheel-68.2.2-3.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4319" version="1" class="patch">
	<metadata>
		<title>security update for python-setuptools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5534.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5534.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880241" comment="python3-setuptools-53.0.0-12.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880242" comment="python3-setuptools-wheel-53.0.0-12.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4320" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34750" ref_url="https://www.suse.com/security/cve/CVE-2024-34750/" source="CVE"/>
		<reference ref_id="CVE-2024-38286" ref_url="https://www.suse.com/security/cve/CVE-2024-38286/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5693.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5693.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34750/">CVE-2024-34750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34750">CVE-2024-34750 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-38286/">CVE-2024-38286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38286">CVE-2024-38286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880871" comment="tomcat-9.0.87-1.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880872" comment="tomcat-admin-webapps-9.0.87-1.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880873" comment="tomcat-docs-webapp-9.0.87-1.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880874" comment="tomcat-el-3.0-api-9.0.87-1.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880875" comment="tomcat-jsp-2.3-api-9.0.87-1.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880876" comment="tomcat-lib-9.0.87-1.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880877" comment="tomcat-servlet-4.0-api-9.0.87-1.el9_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880878" comment="tomcat-webapps-9.0.87-1.el9_4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4321" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-22018" ref_url="https://www.suse.com/security/cve/CVE-2024-22018/" source="CVE"/>
		<reference ref_id="CVE-2024-22020" ref_url="https://www.suse.com/security/cve/CVE-2024-22020/" source="CVE"/>
		<reference ref_id="CVE-2024-36137" ref_url="https://www.suse.com/security/cve/CVE-2024-36137/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5815.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5815.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22018/">CVE-2024-22018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22018">CVE-2024-22018 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22020/">CVE-2024-22020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22020">CVE-2024-22020 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36137/">CVE-2024-36137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36137">CVE-2024-36137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881076" comment="nodejs-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881077" comment="nodejs-devel-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881078" comment="nodejs-docs-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881079" comment="nodejs-full-i18n-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881080" comment="npm-10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4322" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-50495" ref_url="https://www.suse.com/security/cve/CVE-2022-50495/" source="CVE"/>
		<reference ref_id="CVE-2023-52771" ref_url="https://www.suse.com/security/cve/CVE-2023-52771/" source="CVE"/>
		<reference ref_id="CVE-2023-52880" ref_url="https://www.suse.com/security/cve/CVE-2023-52880/" source="CVE"/>
		<reference ref_id="CVE-2024-26581" ref_url="https://www.suse.com/security/cve/CVE-2024-26581/" source="CVE"/>
		<reference ref_id="CVE-2024-26668" ref_url="https://www.suse.com/security/cve/CVE-2024-26668/" source="CVE"/>
		<reference ref_id="CVE-2024-26810" ref_url="https://www.suse.com/security/cve/CVE-2024-26810/" source="CVE"/>
		<reference ref_id="CVE-2024-26855" ref_url="https://www.suse.com/security/cve/CVE-2024-26855/" source="CVE"/>
		<reference ref_id="CVE-2024-26908" ref_url="https://www.suse.com/security/cve/CVE-2024-26908/" source="CVE"/>
		<reference ref_id="CVE-2024-26925" ref_url="https://www.suse.com/security/cve/CVE-2024-26925/" source="CVE"/>
		<reference ref_id="CVE-2024-27016" ref_url="https://www.suse.com/security/cve/CVE-2024-27016/" source="CVE"/>
		<reference ref_id="CVE-2024-27019" ref_url="https://www.suse.com/security/cve/CVE-2024-27019/" source="CVE"/>
		<reference ref_id="CVE-2024-27020" ref_url="https://www.suse.com/security/cve/CVE-2024-27020/" source="CVE"/>
		<reference ref_id="CVE-2024-27415" ref_url="https://www.suse.com/security/cve/CVE-2024-27415/" source="CVE"/>
		<reference ref_id="CVE-2024-35839" ref_url="https://www.suse.com/security/cve/CVE-2024-35839/" source="CVE"/>
		<reference ref_id="CVE-2024-35896" ref_url="https://www.suse.com/security/cve/CVE-2024-35896/" source="CVE"/>
		<reference ref_id="CVE-2024-35897" ref_url="https://www.suse.com/security/cve/CVE-2024-35897/" source="CVE"/>
		<reference ref_id="CVE-2024-35898" ref_url="https://www.suse.com/security/cve/CVE-2024-35898/" source="CVE"/>
		<reference ref_id="CVE-2024-35962" ref_url="https://www.suse.com/security/cve/CVE-2024-35962/" source="CVE"/>
		<reference ref_id="CVE-2024-36003" ref_url="https://www.suse.com/security/cve/CVE-2024-36003/" source="CVE"/>
		<reference ref_id="CVE-2024-36025" ref_url="https://www.suse.com/security/cve/CVE-2024-36025/" source="CVE"/>
		<reference ref_id="CVE-2024-38538" ref_url="https://www.suse.com/security/cve/CVE-2024-38538/" source="CVE"/>
		<reference ref_id="CVE-2024-38540" ref_url="https://www.suse.com/security/cve/CVE-2024-38540/" source="CVE"/>
		<reference ref_id="CVE-2024-38544" ref_url="https://www.suse.com/security/cve/CVE-2024-38544/" source="CVE"/>
		<reference ref_id="CVE-2024-38579" ref_url="https://www.suse.com/security/cve/CVE-2024-38579/" source="CVE"/>
		<reference ref_id="CVE-2024-38608" ref_url="https://www.suse.com/security/cve/CVE-2024-38608/" source="CVE"/>
		<reference ref_id="CVE-2024-39476" ref_url="https://www.suse.com/security/cve/CVE-2024-39476/" source="CVE"/>
		<reference ref_id="CVE-2024-40905" ref_url="https://www.suse.com/security/cve/CVE-2024-40905/" source="CVE"/>
		<reference ref_id="CVE-2024-40911" ref_url="https://www.suse.com/security/cve/CVE-2024-40911/" source="CVE"/>
		<reference ref_id="CVE-2024-40912" ref_url="https://www.suse.com/security/cve/CVE-2024-40912/" source="CVE"/>
		<reference ref_id="CVE-2024-40914" ref_url="https://www.suse.com/security/cve/CVE-2024-40914/" source="CVE"/>
		<reference ref_id="CVE-2024-40929" ref_url="https://www.suse.com/security/cve/CVE-2024-40929/" source="CVE"/>
		<reference ref_id="CVE-2024-40939" ref_url="https://www.suse.com/security/cve/CVE-2024-40939/" source="CVE"/>
		<reference ref_id="CVE-2024-40941" ref_url="https://www.suse.com/security/cve/CVE-2024-40941/" source="CVE"/>
		<reference ref_id="CVE-2024-40957" ref_url="https://www.suse.com/security/cve/CVE-2024-40957/" source="CVE"/>
		<reference ref_id="CVE-2024-40978" ref_url="https://www.suse.com/security/cve/CVE-2024-40978/" source="CVE"/>
		<reference ref_id="CVE-2024-40983" ref_url="https://www.suse.com/security/cve/CVE-2024-40983/" source="CVE"/>
		<reference ref_id="CVE-2024-41041" ref_url="https://www.suse.com/security/cve/CVE-2024-41041/" source="CVE"/>
		<reference ref_id="CVE-2024-41076" ref_url="https://www.suse.com/security/cve/CVE-2024-41076/" source="CVE"/>
		<reference ref_id="CVE-2024-41090" ref_url="https://www.suse.com/security/cve/CVE-2024-41090/" source="CVE"/>
		<reference ref_id="CVE-2024-41091" ref_url="https://www.suse.com/security/cve/CVE-2024-41091/" source="CVE"/>
		<reference ref_id="CVE-2024-42110" ref_url="https://www.suse.com/security/cve/CVE-2024-42110/" source="CVE"/>
		<reference ref_id="CVE-2024-42152" ref_url="https://www.suse.com/security/cve/CVE-2024-42152/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5928.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5928.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50495/">CVE-2022-50495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50495">CVE-2022-50495 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52771/">CVE-2023-52771 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52771">CVE-2023-52771 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52880/">CVE-2023-52880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52880">CVE-2023-52880 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26581/">CVE-2024-26581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26581">CVE-2024-26581 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26668/">CVE-2024-26668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26668">CVE-2024-26668 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26810/">CVE-2024-26810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26810">CVE-2024-26810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26855/">CVE-2024-26855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26855">CVE-2024-26855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26908/">CVE-2024-26908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26908">CVE-2024-26908 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26925/">CVE-2024-26925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27016/">CVE-2024-27016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27016">CVE-2024-27016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27019/">CVE-2024-27019 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27019">CVE-2024-27019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27020/">CVE-2024-27020 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27020">CVE-2024-27020 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-27415/">CVE-2024-27415 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27415">CVE-2024-27415 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35839/">CVE-2024-35839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35839">CVE-2024-35839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35896/">CVE-2024-35896 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35896">CVE-2024-35896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35897/">CVE-2024-35897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35897">CVE-2024-35897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35898/">CVE-2024-35898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35898">CVE-2024-35898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35962/">CVE-2024-35962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35962">CVE-2024-35962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36003/">CVE-2024-36003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36003">CVE-2024-36003 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36025/">CVE-2024-36025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36025">CVE-2024-36025 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38538/">CVE-2024-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38538">CVE-2024-38538 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38540/">CVE-2024-38540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38540">CVE-2024-38540 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38544/">CVE-2024-38544 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38544">CVE-2024-38544 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38579/">CVE-2024-38579 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38579">CVE-2024-38579 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38608/">CVE-2024-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38608">CVE-2024-38608 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39476/">CVE-2024-39476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39476">CVE-2024-39476 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40905/">CVE-2024-40905 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40905">CVE-2024-40905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40911/">CVE-2024-40911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40911">CVE-2024-40911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40912/">CVE-2024-40912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40912">CVE-2024-40912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40914/">CVE-2024-40914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40914">CVE-2024-40914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40929/">CVE-2024-40929 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40929">CVE-2024-40929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40939/">CVE-2024-40939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40939">CVE-2024-40939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40941/">CVE-2024-40941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40941">CVE-2024-40941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40957/">CVE-2024-40957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40957">CVE-2024-40957 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40978/">CVE-2024-40978 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40978">CVE-2024-40978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40983/">CVE-2024-40983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40983">CVE-2024-40983 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41041/">CVE-2024-41041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41076/">CVE-2024-41076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41076">CVE-2024-41076 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41090/">CVE-2024-41090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41091/">CVE-2024-41091 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41091">CVE-2024-41091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42110/">CVE-2024-42110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42110">CVE-2024-42110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42152/">CVE-2024-42152 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4323" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5929.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5929.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881472" comment="pg_repack-1.4.8-1.module+el9.4.0+20427+07482b8c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881475" comment="postgresql-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881476" comment="postgresql-contrib-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881477" comment="postgresql-docs-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881478" comment="postgresql-plperl-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881479" comment="postgresql-plpython3-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881480" comment="postgresql-pltcl-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881481" comment="postgresql-private-devel-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881482" comment="postgresql-private-libs-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881483" comment="postgresql-server-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881484" comment="postgresql-server-devel-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881485" comment="postgresql-static-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881486" comment="postgresql-test-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881487" comment="postgresql-test-rpm-macros-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881488" comment="postgresql-upgrade-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881489" comment="postgresql-upgrade-devel-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4324" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5999.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5999.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881490" comment="postgresql-13.16-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881491" comment="postgresql-contrib-13.16-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881492" comment="postgresql-docs-13.16-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881493" comment="postgresql-plperl-13.16-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881494" comment="postgresql-plpython3-13.16-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881495" comment="postgresql-pltcl-13.16-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881496" comment="postgresql-private-devel-13.16-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881497" comment="postgresql-private-libs-13.16-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881498" comment="postgresql-server-13.16-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881499" comment="postgresql-server-devel-13.16-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881500" comment="postgresql-static-13.16-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881501" comment="postgresql-test-13.16-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881502" comment="postgresql-upgrade-13.16-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881503" comment="postgresql-upgrade-devel-13.16-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4325" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6146.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6146.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940510" comment="python3.12-3.12.1-4.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940511" comment="python3.12-debug-3.12.1-4.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940512" comment="python3.12-devel-3.12.1-4.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940513" comment="python3.12-idle-3.12.1-4.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940514" comment="python3.12-libs-3.12.1-4.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940515" comment="python3.12-test-3.12.1-4.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940516" comment="python3.12-tkinter-3.12.1-4.el9_4.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4326" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-22020" ref_url="https://www.suse.com/security/cve/CVE-2024-22020/" source="CVE"/>
		<reference ref_id="CVE-2024-28863" ref_url="https://www.suse.com/security/cve/CVE-2024-28863/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6147.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6147.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22020/">CVE-2024-22020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22020">CVE-2024-22020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28863/">CVE-2024-28863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28863">CVE-2024-28863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940517" comment="nodejs-18.20.4-1.module+el9.4.0+22195+c221878e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940518" comment="nodejs-devel-18.20.4-1.module+el9.4.0+22195+c221878e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940519" comment="nodejs-docs-18.20.4-1.module+el9.4.0+22195+c221878e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940520" comment="nodejs-full-i18n-18.20.4-1.module+el9.4.0+22195+c221878e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851983" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0+19762+d716bf3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940521" comment="npm-10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4327" version="1" class="patch">
	<metadata>
		<title>security update for python-urllib3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6162.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6162.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941953" comment="python3-urllib3-1.26.5-5.el9_4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4328" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6163.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6163.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942219" comment="python-unversioned-command-3.9.18-3.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942220" comment="python3-3.9.18-3.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942221" comment="python3-debug-3.9.18-3.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942222" comment="python3-devel-3.9.18-3.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942223" comment="python3-idle-3.9.18-3.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942224" comment="python3-libs-3.9.18-3.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942225" comment="python3-test-3.9.18-3.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942226" comment="python3-tkinter-3.9.18-3.el9_4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4329" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-37370" ref_url="https://www.suse.com/security/cve/CVE-2024-37370/" source="CVE"/>
		<reference ref_id="CVE-2024-37371" ref_url="https://www.suse.com/security/cve/CVE-2024-37371/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6166.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6166.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-37370/">CVE-2024-37370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37371/">CVE-2024-37371 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941954" comment="krb5-devel-1.21.1-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941955" comment="krb5-libs-1.21.1-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941956" comment="krb5-pkinit-1.21.1-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941957" comment="krb5-server-1.21.1-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941958" comment="krb5-server-ldap-1.21.1-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941959" comment="krb5-workstation-1.21.1-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941960" comment="libkadm5-1.21.1-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4330" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6179.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6179.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942227" comment="python3.11-3.11.7-1.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942228" comment="python3.11-debug-3.11.7-1.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942229" comment="python3.11-devel-3.11.7-1.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942230" comment="python3.11-idle-3.11.7-1.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942231" comment="python3.11-libs-3.11.7-1.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942232" comment="python3.11-test-3.11.7-1.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942233" comment="python3.11-tkinter-3.11.7-1.el9_4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4331" version="1" class="patch">
	<metadata>
		<title>security update for orc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-40897" ref_url="https://www.suse.com/security/cve/CVE-2024-40897/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6184.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6184.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40897/">CVE-2024-40897 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40897">CVE-2024-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941961" comment="orc-0.4.31-7.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941962" comment="orc-compiler-0.4.31-7.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941963" comment="orc-devel-0.4.31-7.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4332" version="1" class="patch">
	<metadata>
		<title>security update for containernetworking-plugins (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6186.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6186.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941964" comment="containernetworking-plugins-1.4.0-5.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4333" version="1" class="patch">
	<metadata>
		<title>security update for gvisor-tap-vsock (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6187.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6187.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941965" comment="gvisor-tap-vsock-0.7.3-5.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4334" version="1" class="patch">
	<metadata>
		<title>security update for runc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6188.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6188.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941966" comment="runc-1.1.12-4.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4335" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6189.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6189.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941967" comment="buildah-1.33.7-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941968" comment="buildah-tests-1.33.7-4.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4336" version="1" class="patch">
	<metadata>
		<title>security update for wget (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-38428" ref_url="https://www.suse.com/security/cve/CVE-2024-38428/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6192.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6192.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-38428/">CVE-2024-38428 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38428">CVE-2024-38428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941969" comment="wget-1.21.1-8.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4337" version="1" class="patch">
	<metadata>
		<title>security update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<reference ref_id="CVE-2024-37298" ref_url="https://www.suse.com/security/cve/CVE-2024-37298/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6194.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6194.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37298/">CVE-2024-37298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37298">CVE-2024-37298 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941970" comment="podman-4.9.4-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941971" comment="podman-docker-4.9.4-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941972" comment="podman-plugins-4.9.4-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941973" comment="podman-remote-4.9.4-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941974" comment="podman-tests-4.9.4-10.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4338" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6195.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6195.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941975" comment="skopeo-1.14.5-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941976" comment="skopeo-tests-1.14.5-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4339" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-29510" ref_url="https://www.suse.com/security/cve/CVE-2024-29510/" source="CVE"/>
		<reference ref_id="CVE-2024-33869" ref_url="https://www.suse.com/security/cve/CVE-2024-33869/" source="CVE"/>
		<reference ref_id="CVE-2024-33870" ref_url="https://www.suse.com/security/cve/CVE-2024-33870/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6197.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6197.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-29510/">CVE-2024-29510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29510">CVE-2024-29510 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-33869/">CVE-2024-33869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33869">CVE-2024-33869 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33870/">CVE-2024-33870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33870">CVE-2024-33870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942234" comment="ghostscript-9.54.0-17.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942235" comment="ghostscript-doc-9.54.0-17.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942236" comment="ghostscript-tools-dvipdf-9.54.0-17.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942237" comment="ghostscript-tools-fonts-9.54.0-17.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942238" comment="ghostscript-tools-printing-9.54.0-17.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942239" comment="ghostscript-x11-9.54.0-17.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942240" comment="libgs-9.54.0-17.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942241" comment="libgs-devel-9.54.0-17.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4340" version="1" class="patch">
	<metadata>
		<title>Important: bubblewrap and flatpak security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-42472" ref_url="https://www.suse.com/security/cve/CVE-2024-42472/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6356. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024:6356		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42472/">CVE-2024-42472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42472">CVE-2024-42472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942242" comment="bubblewrap-0.4.1-7.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942243" comment="flatpak-1.12.9-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942244" comment="flatpak-libs-1.12.9-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942245" comment="flatpak-selinux-1.12.9-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942246" comment="flatpak-session-helper-1.12.9-3.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4341" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34397" ref_url="https://www.suse.com/security/cve/CVE-2024-34397/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6464.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6464.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34397/">CVE-2024-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941597" comment="glib2-2.68.4-14.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941598" comment="glib2-devel-2.68.4-14.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941599" comment="glib2-doc-2.68.4-14.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941600" comment="glib2-static-2.68.4-14.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941601" comment="glib2-tests-2.68.4-14.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4342" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-39331" ref_url="https://www.suse.com/security/cve/CVE-2024-39331/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6510.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6510.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39331/">CVE-2024-39331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39331">CVE-2024-39331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942247" comment="emacs-27.2-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942248" comment="emacs-common-27.2-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942249" comment="emacs-filesystem-27.2-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942250" comment="emacs-lucid-27.2-10.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942251" comment="emacs-nox-27.2-10.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4343" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-23184" ref_url="https://www.suse.com/security/cve/CVE-2024-23184/" source="CVE"/>
		<reference ref_id="CVE-2024-23185" ref_url="https://www.suse.com/security/cve/CVE-2024-23185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6529.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6529.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-23184/">CVE-2024-23184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23184">CVE-2024-23184 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23185/">CVE-2024-23185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23185">CVE-2024-23185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942252" comment="dovecot-2.3.16-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942253" comment="dovecot-devel-2.3.16-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942254" comment="dovecot-mysql-2.3.16-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942255" comment="dovecot-pgsql-2.3.16-11.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942256" comment="dovecot-pigeonhole-2.3.16-11.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4344" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463/" source="CVE"/>
		<reference ref_id="CVE-2023-52801" ref_url="https://www.suse.com/security/cve/CVE-2023-52801/" source="CVE"/>
		<reference ref_id="CVE-2024-26629" ref_url="https://www.suse.com/security/cve/CVE-2024-26629/" source="CVE"/>
		<reference ref_id="CVE-2024-26630" ref_url="https://www.suse.com/security/cve/CVE-2024-26630/" source="CVE"/>
		<reference ref_id="CVE-2024-26720" ref_url="https://www.suse.com/security/cve/CVE-2024-26720/" source="CVE"/>
		<reference ref_id="CVE-2024-26886" ref_url="https://www.suse.com/security/cve/CVE-2024-26886/" source="CVE"/>
		<reference ref_id="CVE-2024-26946" ref_url="https://www.suse.com/security/cve/CVE-2024-26946/" source="CVE"/>
		<reference ref_id="CVE-2024-35791" ref_url="https://www.suse.com/security/cve/CVE-2024-35791/" source="CVE"/>
		<reference ref_id="CVE-2024-35797" ref_url="https://www.suse.com/security/cve/CVE-2024-35797/" source="CVE"/>
		<reference ref_id="CVE-2024-35875" ref_url="https://www.suse.com/security/cve/CVE-2024-35875/" source="CVE"/>
		<reference ref_id="CVE-2024-36000" ref_url="https://www.suse.com/security/cve/CVE-2024-36000/" source="CVE"/>
		<reference ref_id="CVE-2024-36019" ref_url="https://www.suse.com/security/cve/CVE-2024-36019/" source="CVE"/>
		<reference ref_id="CVE-2024-36883" ref_url="https://www.suse.com/security/cve/CVE-2024-36883/" source="CVE"/>
		<reference ref_id="CVE-2024-36979" ref_url="https://www.suse.com/security/cve/CVE-2024-36979/" source="CVE"/>
		<reference ref_id="CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559/" source="CVE"/>
		<reference ref_id="CVE-2024-38619" ref_url="https://www.suse.com/security/cve/CVE-2024-38619/" source="CVE"/>
		<reference ref_id="CVE-2024-40927" ref_url="https://www.suse.com/security/cve/CVE-2024-40927/" source="CVE"/>
		<reference ref_id="CVE-2024-40936" ref_url="https://www.suse.com/security/cve/CVE-2024-40936/" source="CVE"/>
		<reference ref_id="CVE-2024-41040" ref_url="https://www.suse.com/security/cve/CVE-2024-41040/" source="CVE"/>
		<reference ref_id="CVE-2024-41044" ref_url="https://www.suse.com/security/cve/CVE-2024-41044/" source="CVE"/>
		<reference ref_id="CVE-2024-41055" ref_url="https://www.suse.com/security/cve/CVE-2024-41055/" source="CVE"/>
		<reference ref_id="CVE-2024-41073" ref_url="https://www.suse.com/security/cve/CVE-2024-41073/" source="CVE"/>
		<reference ref_id="CVE-2024-41096" ref_url="https://www.suse.com/security/cve/CVE-2024-41096/" source="CVE"/>
		<reference ref_id="CVE-2024-42082" ref_url="https://www.suse.com/security/cve/CVE-2024-42082/" source="CVE"/>
		<reference ref_id="CVE-2024-42096" ref_url="https://www.suse.com/security/cve/CVE-2024-42096/" source="CVE"/>
		<reference ref_id="CVE-2024-42102" ref_url="https://www.suse.com/security/cve/CVE-2024-42102/" source="CVE"/>
		<reference ref_id="CVE-2024-42131" ref_url="https://www.suse.com/security/cve/CVE-2024-42131/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6567.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6567.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52801/">CVE-2023-52801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52801">CVE-2023-52801 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26629/">CVE-2024-26629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26629">CVE-2024-26629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26630/">CVE-2024-26630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26630">CVE-2024-26630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26720/">CVE-2024-26720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26720">CVE-2024-26720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26886/">CVE-2024-26886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26886">CVE-2024-26886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26946/">CVE-2024-26946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26946">CVE-2024-26946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35791/">CVE-2024-35791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35791">CVE-2024-35791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35797/">CVE-2024-35797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35797">CVE-2024-35797 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35875/">CVE-2024-35875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35875">CVE-2024-35875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36000/">CVE-2024-36000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36000">CVE-2024-36000 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36019/">CVE-2024-36019 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36019">CVE-2024-36019 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36883/">CVE-2024-36883 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36883">CVE-2024-36883 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36979/">CVE-2024-36979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36979">CVE-2024-36979 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38619/">CVE-2024-38619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38619">CVE-2024-38619 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40927/">CVE-2024-40927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40927">CVE-2024-40927 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40936/">CVE-2024-40936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40936">CVE-2024-40936 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41040/">CVE-2024-41040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-41044/">CVE-2024-41044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41055/">CVE-2024-41055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41055">CVE-2024-41055 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41073/">CVE-2024-41073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41073">CVE-2024-41073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41096/">CVE-2024-41096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41096">CVE-2024-41096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42082/">CVE-2024-42082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42082">CVE-2024-42082 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42096/">CVE-2024-42096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42102/">CVE-2024-42102 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42102">CVE-2024-42102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42131/">CVE-2024-42131 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4345" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-7652" ref_url="https://www.suse.com/security/cve/CVE-2024-7652/" source="CVE"/>
		<reference ref_id="CVE-2024-8381" ref_url="https://www.suse.com/security/cve/CVE-2024-8381/" source="CVE"/>
		<reference ref_id="CVE-2024-8382" ref_url="https://www.suse.com/security/cve/CVE-2024-8382/" source="CVE"/>
		<reference ref_id="CVE-2024-8383" ref_url="https://www.suse.com/security/cve/CVE-2024-8383/" source="CVE"/>
		<reference ref_id="CVE-2024-8384" ref_url="https://www.suse.com/security/cve/CVE-2024-8384/" source="CVE"/>
		<reference ref_id="CVE-2024-8385" ref_url="https://www.suse.com/security/cve/CVE-2024-8385/" source="CVE"/>
		<reference ref_id="CVE-2024-8386" ref_url="https://www.suse.com/security/cve/CVE-2024-8386/" source="CVE"/>
		<reference ref_id="CVE-2024-8387" ref_url="https://www.suse.com/security/cve/CVE-2024-8387/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6681.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6681.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-7652/">CVE-2024-7652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7652">CVE-2024-7652 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8381/">CVE-2024-8381 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8382/">CVE-2024-8382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8383/">CVE-2024-8383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8383">CVE-2024-8383 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8384/">CVE-2024-8384 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8385/">CVE-2024-8385 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8386/">CVE-2024-8386 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8387/">CVE-2024-8387 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945000" comment="firefox-128.2.0-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945001" comment="firefox-x11-128.2.0-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4346" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-7652" ref_url="https://www.suse.com/security/cve/CVE-2024-7652/" source="CVE"/>
		<reference ref_id="CVE-2024-8381" ref_url="https://www.suse.com/security/cve/CVE-2024-8381/" source="CVE"/>
		<reference ref_id="CVE-2024-8382" ref_url="https://www.suse.com/security/cve/CVE-2024-8382/" source="CVE"/>
		<reference ref_id="CVE-2024-8384" ref_url="https://www.suse.com/security/cve/CVE-2024-8384/" source="CVE"/>
		<reference ref_id="CVE-2024-8385" ref_url="https://www.suse.com/security/cve/CVE-2024-8385/" source="CVE"/>
		<reference ref_id="CVE-2024-8386" ref_url="https://www.suse.com/security/cve/CVE-2024-8386/" source="CVE"/>
		<reference ref_id="CVE-2024-8387" ref_url="https://www.suse.com/security/cve/CVE-2024-8387/" source="CVE"/>
		<reference ref_id="CVE-2024-8394" ref_url="https://www.suse.com/security/cve/CVE-2024-8394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6683.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6683.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-7652/">CVE-2024-7652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7652">CVE-2024-7652 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8381/">CVE-2024-8381 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8382/">CVE-2024-8382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8384/">CVE-2024-8384 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8385/">CVE-2024-8385 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8386/">CVE-2024-8386 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8387/">CVE-2024-8387 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8394/">CVE-2024-8394 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8394">CVE-2024-8394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945002" comment="thunderbird-128.2.0-1.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4347" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6726.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6726.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943028" comment="fence-agents-aliyun-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943029" comment="fence-agents-all-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943030" comment="fence-agents-amt-ws-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943031" comment="fence-agents-apc-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943032" comment="fence-agents-apc-snmp-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943033" comment="fence-agents-aws-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943034" comment="fence-agents-azure-arm-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943035" comment="fence-agents-bladecenter-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943036" comment="fence-agents-brocade-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943037" comment="fence-agents-cisco-mds-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943038" comment="fence-agents-cisco-ucs-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943039" comment="fence-agents-common-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943040" comment="fence-agents-compute-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943041" comment="fence-agents-drac5-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943042" comment="fence-agents-eaton-snmp-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943043" comment="fence-agents-emerson-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943044" comment="fence-agents-eps-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943045" comment="fence-agents-gce-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943046" comment="fence-agents-heuristics-ping-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943047" comment="fence-agents-hpblade-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943048" comment="fence-agents-ibm-powervs-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943049" comment="fence-agents-ibm-vpc-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943050" comment="fence-agents-ibmblade-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943051" comment="fence-agents-ifmib-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943052" comment="fence-agents-ilo-moonshot-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943053" comment="fence-agents-ilo-mp-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943054" comment="fence-agents-ilo-ssh-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943055" comment="fence-agents-ilo2-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943056" comment="fence-agents-intelmodular-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943057" comment="fence-agents-ipdu-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943058" comment="fence-agents-ipmilan-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943059" comment="fence-agents-kdump-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943060" comment="fence-agents-kubevirt-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943061" comment="fence-agents-mpath-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943062" comment="fence-agents-openstack-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943063" comment="fence-agents-redfish-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943064" comment="fence-agents-rhevm-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943065" comment="fence-agents-rsa-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943066" comment="fence-agents-rsb-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943067" comment="fence-agents-sbd-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943068" comment="fence-agents-scsi-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943069" comment="fence-agents-virsh-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943070" comment="fence-agents-vmware-rest-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943071" comment="fence-agents-vmware-soap-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943072" comment="fence-agents-wti-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943073" comment="fence-virt-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943074" comment="fence-virtd-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943075" comment="fence-virtd-cpg-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943076" comment="fence-virtd-libvirt-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943077" comment="fence-virtd-multicast-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943078" comment="fence-virtd-serial-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943079" comment="fence-virtd-tcp-4.10.0-62.el9_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943080" comment="ha-cloud-support-4.10.0-62.el9_4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4348" version="1" class="patch">
	<metadata>
		<title>security update for expat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6754.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6754.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943430" comment="expat-2.5.0-2.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943431" comment="expat-devel-2.5.0-2.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4349" version="1" class="patch">
	<metadata>
		<title>security update for libnbd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-7383" ref_url="https://www.suse.com/security/cve/CVE-2024-7383/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6757.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6757.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7383/">CVE-2024-7383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7383">CVE-2024-7383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943432" comment="libnbd-1.18.1-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943433" comment="libnbd-bash-completion-1.18.1-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943434" comment="libnbd-devel-1.18.1-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943435" comment="nbdfuse-1.18.1-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943436" comment="ocaml-libnbd-1.18.1-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943437" comment="ocaml-libnbd-devel-1.18.1-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943438" comment="python3-libnbd-1.18.1-4.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4350" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6119" ref_url="https://www.suse.com/security/cve/CVE-2024-6119/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6783.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6783.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6119/">CVE-2024-6119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6119">CVE-2024-6119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943439" comment="openssl-3.0.7-28.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943440" comment="openssl-devel-3.0.7-28.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943441" comment="openssl-libs-3.0.7-28.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943442" comment="openssl-perl-3.0.7-28.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4351" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-39908" ref_url="https://www.suse.com/security/cve/CVE-2024-39908/" source="CVE"/>
		<reference ref_id="CVE-2024-41123" ref_url="https://www.suse.com/security/cve/CVE-2024-41123/" source="CVE"/>
		<reference ref_id="CVE-2024-41946" ref_url="https://www.suse.com/security/cve/CVE-2024-41946/" source="CVE"/>
		<reference ref_id="CVE-2024-43398" ref_url="https://www.suse.com/security/cve/CVE-2024-43398/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6785.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6785.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39908/">CVE-2024-39908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39908">CVE-2024-39908 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41123/">CVE-2024-41123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41123">CVE-2024-41123 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41946/">CVE-2024-41946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41946">CVE-2024-41946 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43398/">CVE-2024-43398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43398">CVE-2024-43398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943818" comment="ruby-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943819" comment="ruby-bundled-gems-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943820" comment="ruby-default-gems-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943821" comment="ruby-devel-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943822" comment="ruby-doc-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943823" comment="ruby-libs-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943824" comment="rubygem-bigdecimal-3.1.5-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943825" comment="rubygem-bundler-2.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943826" comment="rubygem-io-console-0.7.1-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943827" comment="rubygem-irb-1.13.1-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943828" comment="rubygem-json-2.7.1-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943829" comment="rubygem-minitest-5.20.0-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874724" comment="rubygem-mysql2-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874725" comment="rubygem-mysql2-doc-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943830" comment="rubygem-power_assert-2.0.3-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943831" comment="rubygem-psych-5.1.2-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943832" comment="rubygem-racc-1.7.3-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943833" comment="rubygem-rake-13.1.0-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943834" comment="rubygem-rbs-3.4.0-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943835" comment="rubygem-rdoc-6.6.3.1-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943836" comment="rubygem-rexml-3.3.6-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943837" comment="rubygem-rss-0.3.1-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943838" comment="rubygem-test-unit-3.6.1-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943839" comment="rubygem-typeprof-0.21.9-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943840" comment="rubygems-3.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943841" comment="rubygems-devel-3.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4352" version="1" class="patch">
	<metadata>
		<title>security update for pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-45769" ref_url="https://www.suse.com/security/cve/CVE-2024-45769/" source="CVE"/>
		<reference ref_id="CVE-2024-45770" ref_url="https://www.suse.com/security/cve/CVE-2024-45770/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6848.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6848.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45769/">CVE-2024-45769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45769">CVE-2024-45769 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45770/">CVE-2024-45770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45770">CVE-2024-45770 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943842" comment="pcp-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943843" comment="pcp-conf-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943844" comment="pcp-devel-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943845" comment="pcp-doc-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943846" comment="pcp-export-pcp2elasticsearch-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943847" comment="pcp-export-pcp2graphite-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943848" comment="pcp-export-pcp2influxdb-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943849" comment="pcp-export-pcp2json-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943850" comment="pcp-export-pcp2spark-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943851" comment="pcp-export-pcp2xml-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943852" comment="pcp-export-pcp2zabbix-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943853" comment="pcp-export-zabbix-agent-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943854" comment="pcp-geolocate-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943855" comment="pcp-gui-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943856" comment="pcp-import-collectl2pcp-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943857" comment="pcp-import-ganglia2pcp-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943858" comment="pcp-import-iostat2pcp-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943859" comment="pcp-import-mrtg2pcp-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943860" comment="pcp-import-sar2pcp-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943861" comment="pcp-libs-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943862" comment="pcp-libs-devel-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943863" comment="pcp-pmda-activemq-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943864" comment="pcp-pmda-apache-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943865" comment="pcp-pmda-bash-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943866" comment="pcp-pmda-bcc-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943867" comment="pcp-pmda-bind2-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943868" comment="pcp-pmda-bonding-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943869" comment="pcp-pmda-bpf-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943870" comment="pcp-pmda-bpftrace-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943871" comment="pcp-pmda-cifs-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943872" comment="pcp-pmda-cisco-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943873" comment="pcp-pmda-dbping-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943874" comment="pcp-pmda-denki-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943875" comment="pcp-pmda-dm-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943876" comment="pcp-pmda-docker-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943877" comment="pcp-pmda-ds389-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943878" comment="pcp-pmda-ds389log-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943879" comment="pcp-pmda-elasticsearch-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943880" comment="pcp-pmda-farm-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943881" comment="pcp-pmda-gfs2-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943882" comment="pcp-pmda-gluster-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943883" comment="pcp-pmda-gpfs-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943884" comment="pcp-pmda-gpsd-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943885" comment="pcp-pmda-hacluster-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943886" comment="pcp-pmda-haproxy-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943887" comment="pcp-pmda-infiniband-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943888" comment="pcp-pmda-json-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943889" comment="pcp-pmda-libvirt-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943890" comment="pcp-pmda-lio-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943891" comment="pcp-pmda-lmsensors-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943892" comment="pcp-pmda-logger-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943893" comment="pcp-pmda-lustre-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943894" comment="pcp-pmda-lustrecomm-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943895" comment="pcp-pmda-mailq-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943896" comment="pcp-pmda-memcache-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943897" comment="pcp-pmda-mic-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943898" comment="pcp-pmda-mongodb-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943899" comment="pcp-pmda-mounts-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943900" comment="pcp-pmda-mssql-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943901" comment="pcp-pmda-mysql-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943902" comment="pcp-pmda-named-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943903" comment="pcp-pmda-netcheck-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943904" comment="pcp-pmda-netfilter-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943905" comment="pcp-pmda-news-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943906" comment="pcp-pmda-nfsclient-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943907" comment="pcp-pmda-nginx-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943908" comment="pcp-pmda-nvidia-gpu-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943909" comment="pcp-pmda-openmetrics-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943910" comment="pcp-pmda-openvswitch-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943911" comment="pcp-pmda-oracle-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943912" comment="pcp-pmda-pdns-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943913" comment="pcp-pmda-perfevent-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943914" comment="pcp-pmda-podman-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943915" comment="pcp-pmda-postfix-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943916" comment="pcp-pmda-postgresql-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943917" comment="pcp-pmda-rabbitmq-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943918" comment="pcp-pmda-redis-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943919" comment="pcp-pmda-resctrl-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943920" comment="pcp-pmda-roomtemp-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943921" comment="pcp-pmda-rsyslog-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943922" comment="pcp-pmda-samba-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943923" comment="pcp-pmda-sendmail-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943924" comment="pcp-pmda-shping-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943925" comment="pcp-pmda-slurm-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943926" comment="pcp-pmda-smart-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943927" comment="pcp-pmda-snmp-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943928" comment="pcp-pmda-sockets-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943929" comment="pcp-pmda-statsd-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943930" comment="pcp-pmda-summary-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943931" comment="pcp-pmda-systemd-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943932" comment="pcp-pmda-trace-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943933" comment="pcp-pmda-unbound-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943934" comment="pcp-pmda-weblog-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943935" comment="pcp-pmda-zimbra-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943936" comment="pcp-pmda-zswap-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943937" comment="pcp-selinux-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943938" comment="pcp-system-tools-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943939" comment="pcp-zeroconf-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943940" comment="perl-PCP-LogImport-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943941" comment="perl-PCP-LogSummary-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943942" comment="perl-PCP-MMV-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943943" comment="perl-PCP-PMDA-6.2.0-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943944" comment="python3-pcp-6.2.0-5.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4353" version="1" class="patch">
	<metadata>
		<title>security update for golang (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6913.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6913.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944120" comment="go-toolset-1.21.13-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944121" comment="golang-1.21.13-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944122" comment="golang-bin-1.21.13-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944123" comment="golang-docs-1.21.13-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944124" comment="golang-misc-1.21.13-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944125" comment="golang-src-1.21.13-3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944126" comment="golang-tests-1.21.13-3.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4354" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6946.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6946.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944459" comment="grafana-pcp-5.1.1-3.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4355" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6947.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6947.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944460" comment="grafana-9.2.10-17.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944461" comment="grafana-selinux-9.2.10-17.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4356" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-52439" ref_url="https://www.suse.com/security/cve/CVE-2023-52439/" source="CVE"/>
		<reference ref_id="CVE-2023-52884" ref_url="https://www.suse.com/security/cve/CVE-2023-52884/" source="CVE"/>
		<reference ref_id="CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739/" source="CVE"/>
		<reference ref_id="CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929/" source="CVE"/>
		<reference ref_id="CVE-2024-26930" ref_url="https://www.suse.com/security/cve/CVE-2024-26930/" source="CVE"/>
		<reference ref_id="CVE-2024-26931" ref_url="https://www.suse.com/security/cve/CVE-2024-26931/" source="CVE"/>
		<reference ref_id="CVE-2024-26947" ref_url="https://www.suse.com/security/cve/CVE-2024-26947/" source="CVE"/>
		<reference ref_id="CVE-2024-26991" ref_url="https://www.suse.com/security/cve/CVE-2024-26991/" source="CVE"/>
		<reference ref_id="CVE-2024-27022" ref_url="https://www.suse.com/security/cve/CVE-2024-27022/" source="CVE"/>
		<reference ref_id="CVE-2024-35895" ref_url="https://www.suse.com/security/cve/CVE-2024-35895/" source="CVE"/>
		<reference ref_id="CVE-2024-36016" ref_url="https://www.suse.com/security/cve/CVE-2024-36016/" source="CVE"/>
		<reference ref_id="CVE-2024-36899" ref_url="https://www.suse.com/security/cve/CVE-2024-36899/" source="CVE"/>
		<reference ref_id="CVE-2024-38562" ref_url="https://www.suse.com/security/cve/CVE-2024-38562/" source="CVE"/>
		<reference ref_id="CVE-2024-38570" ref_url="https://www.suse.com/security/cve/CVE-2024-38570/" source="CVE"/>
		<reference ref_id="CVE-2024-38573" ref_url="https://www.suse.com/security/cve/CVE-2024-38573/" source="CVE"/>
		<reference ref_id="CVE-2024-38601" ref_url="https://www.suse.com/security/cve/CVE-2024-38601/" source="CVE"/>
		<reference ref_id="CVE-2024-38615" ref_url="https://www.suse.com/security/cve/CVE-2024-38615/" source="CVE"/>
		<reference ref_id="CVE-2024-40984" ref_url="https://www.suse.com/security/cve/CVE-2024-40984/" source="CVE"/>
		<reference ref_id="CVE-2024-41071" ref_url="https://www.suse.com/security/cve/CVE-2024-41071/" source="CVE"/>
		<reference ref_id="CVE-2024-42225" ref_url="https://www.suse.com/security/cve/CVE-2024-42225/" source="CVE"/>
		<reference ref_id="CVE-2024-42246" ref_url="https://www.suse.com/security/cve/CVE-2024-42246/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6997.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6997.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52439/">CVE-2023-52439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52884/">CVE-2023-52884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52884">CVE-2023-52884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26930/">CVE-2024-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26931/">CVE-2024-26931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26931">CVE-2024-26931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26947/">CVE-2024-26947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26947">CVE-2024-26947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26991/">CVE-2024-26991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26991">CVE-2024-26991 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27022/">CVE-2024-27022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27022">CVE-2024-27022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35895/">CVE-2024-35895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36016/">CVE-2024-36016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36016">CVE-2024-36016 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36899/">CVE-2024-36899 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36899">CVE-2024-36899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38562/">CVE-2024-38562 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38562">CVE-2024-38562 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38570/">CVE-2024-38570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38570">CVE-2024-38570 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38573/">CVE-2024-38573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38573">CVE-2024-38573 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38601/">CVE-2024-38601 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38601">CVE-2024-38601 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38615/">CVE-2024-38615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38615">CVE-2024-38615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40984/">CVE-2024-40984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40984">CVE-2024-40984 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41071/">CVE-2024-41071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41071">CVE-2024-41071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42225/">CVE-2024-42225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42246/">CVE-2024-42246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42246">CVE-2024-42246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4357" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7136.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7136.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944793" comment="git-lfs-3.4.1-4.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4358" version="1" class="patch">
	<metadata>
		<title>security update for net-snmp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-24805" ref_url="https://www.suse.com/security/cve/CVE-2022-24805/" source="CVE"/>
		<reference ref_id="CVE-2022-24806" ref_url="https://www.suse.com/security/cve/CVE-2022-24806/" source="CVE"/>
		<reference ref_id="CVE-2022-24807" ref_url="https://www.suse.com/security/cve/CVE-2022-24807/" source="CVE"/>
		<reference ref_id="CVE-2022-24808" ref_url="https://www.suse.com/security/cve/CVE-2022-24808/" source="CVE"/>
		<reference ref_id="CVE-2022-24809" ref_url="https://www.suse.com/security/cve/CVE-2022-24809/" source="CVE"/>
		<reference ref_id="CVE-2022-24810" ref_url="https://www.suse.com/security/cve/CVE-2022-24810/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7260.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7260.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24805/">CVE-2022-24805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24805">CVE-2022-24805 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24806/">CVE-2022-24806 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24806">CVE-2022-24806 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24807/">CVE-2022-24807 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24807">CVE-2022-24807 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24808/">CVE-2022-24808 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24808">CVE-2022-24808 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24809/">CVE-2022-24809 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24809">CVE-2022-24809 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24810/">CVE-2022-24810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24810">CVE-2022-24810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945003" comment="net-snmp-5.9.1-13.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945004" comment="net-snmp-agent-libs-5.9.1-13.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945005" comment="net-snmp-devel-5.9.1-13.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945006" comment="net-snmp-libs-5.9.1-13.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945007" comment="net-snmp-perl-5.9.1-13.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945008" comment="net-snmp-utils-5.9.1-13.el9_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945009" comment="python3-net-snmp-5.9.1-13.el9_4.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4359" version="1" class="patch">
	<metadata>
		<title>security update for cups-filters (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-47076" ref_url="https://www.suse.com/security/cve/CVE-2024-47076/" source="CVE"/>
		<reference ref_id="CVE-2024-47175" ref_url="https://www.suse.com/security/cve/CVE-2024-47175/" source="CVE"/>
		<reference ref_id="CVE-2024-47176" ref_url="https://www.suse.com/security/cve/CVE-2024-47176/" source="CVE"/>
		<reference ref_id="CVE-2024-47850" ref_url="https://www.suse.com/security/cve/CVE-2024-47850/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7346.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7346.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47076/">CVE-2024-47076 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47076">CVE-2024-47076 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47175/">CVE-2024-47175 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47175">CVE-2024-47175 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47176/">CVE-2024-47176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47176">CVE-2024-47176 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47850/">CVE-2024-47850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47850">CVE-2024-47850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945283" comment="cups-filters-1.28.7-17.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945284" comment="cups-filters-devel-1.28.7-17.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945285" comment="cups-filters-libs-1.28.7-17.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4360" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-20584" ref_url="https://www.suse.com/security/cve/CVE-2023-20584/" source="CVE"/>
		<reference ref_id="CVE-2023-31356" ref_url="https://www.suse.com/security/cve/CVE-2023-31356/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7484.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7484.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" cvss4="4/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2023-20584/">CVE-2023-20584 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20584">CVE-2023-20584 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-31356/">CVE-2023-31356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-31356">CVE-2023-31356 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945415" comment="iwl100-firmware-39.31.5.1-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945416" comment="iwl1000-firmware-39.31.5.1-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945417" comment="iwl105-firmware-18.168.6.1-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945418" comment="iwl135-firmware-18.168.6.1-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945419" comment="iwl2000-firmware-18.168.6.1-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945420" comment="iwl2030-firmware-18.168.6.1-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945421" comment="iwl3160-firmware-25.30.13.0-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945422" comment="iwl5000-firmware-8.83.5.1_1-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945423" comment="iwl5150-firmware-8.24.2.2-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945424" comment="iwl6000g2a-firmware-18.168.6.1-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945425" comment="iwl6000g2b-firmware-18.168.6.1-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945426" comment="iwl6050-firmware-41.28.5.1-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945427" comment="iwl7260-firmware-25.30.13.0-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945428" comment="libertas-sd8787-firmware-20240905-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945429" comment="linux-firmware-20240905-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945430" comment="linux-firmware-whence-20240905-143.3.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945431" comment="netronome-firmware-20240905-143.3.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4361" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392/" source="CVE"/>
		<reference ref_id="CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393/" source="CVE"/>
		<reference ref_id="CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394/" source="CVE"/>
		<reference ref_id="CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401/" source="CVE"/>
		<reference ref_id="CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7505.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7505.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945529" comment="firefox-128.3.0-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945530" comment="firefox-x11-128.3.0-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4362" version="1" class="patch">
	<metadata>
		<title>security update for golang (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-9355" ref_url="https://www.suse.com/security/cve/CVE-2024-9355/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7550.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7550.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9355/">CVE-2024-9355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9355">CVE-2024-9355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945478" comment="go-toolset-1.21.13-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945479" comment="golang-1.21.13-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945480" comment="golang-bin-1.21.13-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945481" comment="golang-docs-1.21.13-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945482" comment="golang-misc-1.21.13-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945483" comment="golang-src-1.21.13-4.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945484" comment="golang-tests-1.21.13-4.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4363" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392/" source="CVE"/>
		<reference ref_id="CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393/" source="CVE"/>
		<reference ref_id="CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394/" source="CVE"/>
		<reference ref_id="CVE-2024-9396" ref_url="https://www.suse.com/security/cve/CVE-2024-9396/" source="CVE"/>
		<reference ref_id="CVE-2024-9397" ref_url="https://www.suse.com/security/cve/CVE-2024-9397/" source="CVE"/>
		<reference ref_id="CVE-2024-9398" ref_url="https://www.suse.com/security/cve/CVE-2024-9398/" source="CVE"/>
		<reference ref_id="CVE-2024-9399" ref_url="https://www.suse.com/security/cve/CVE-2024-9399/" source="CVE"/>
		<reference ref_id="CVE-2024-9400" ref_url="https://www.suse.com/security/cve/CVE-2024-9400/" source="CVE"/>
		<reference ref_id="CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401/" source="CVE"/>
		<reference ref_id="CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402/" source="CVE"/>
		<reference ref_id="CVE-2024-9403" ref_url="https://www.suse.com/security/cve/CVE-2024-9403/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7552.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7552.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9396/">CVE-2024-9396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9397/">CVE-2024-9397 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9398/">CVE-2024-9398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9398">CVE-2024-9398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9399/">CVE-2024-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9400/">CVE-2024-9400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9403/">CVE-2024-9403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9403">CVE-2024-9403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945531" comment="thunderbird-128.3.0-1.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4364" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-43483" ref_url="https://www.suse.com/security/cve/CVE-2024-43483/" source="CVE"/>
		<reference ref_id="CVE-2024-43484" ref_url="https://www.suse.com/security/cve/CVE-2024-43484/" source="CVE"/>
		<reference ref_id="CVE-2024-43485" ref_url="https://www.suse.com/security/cve/CVE-2024-43485/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7867.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7867.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43483/">CVE-2024-43483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43483">CVE-2024-43483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43484/">CVE-2024-43484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43484">CVE-2024-43484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43485/">CVE-2024-43485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43485">CVE-2024-43485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946449" comment="aspnetcore-runtime-6.0-6.0.35-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946450" comment="aspnetcore-targeting-pack-6.0-6.0.35-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946451" comment="dotnet-apphost-pack-6.0-6.0.35-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946452" comment="dotnet-hostfxr-6.0-6.0.35-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946453" comment="dotnet-runtime-6.0-6.0.35-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946454" comment="dotnet-sdk-6.0-6.0.135-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946455" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946456" comment="dotnet-targeting-pack-6.0-6.0.35-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946457" comment="dotnet-templates-6.0-6.0.135-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4365" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-38229" ref_url="https://www.suse.com/security/cve/CVE-2024-38229/" source="CVE"/>
		<reference ref_id="CVE-2024-43483" ref_url="https://www.suse.com/security/cve/CVE-2024-43483/" source="CVE"/>
		<reference ref_id="CVE-2024-43484" ref_url="https://www.suse.com/security/cve/CVE-2024-43484/" source="CVE"/>
		<reference ref_id="CVE-2024-43485" ref_url="https://www.suse.com/security/cve/CVE-2024-43485/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7869.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7869.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38229/">CVE-2024-38229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38229">CVE-2024-38229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43483/">CVE-2024-43483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43483">CVE-2024-43483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43484/">CVE-2024-43484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43484">CVE-2024-43484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43485/">CVE-2024-43485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43485">CVE-2024-43485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946458" comment="aspnetcore-runtime-8.0-8.0.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946459" comment="aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946460" comment="aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946461" comment="dotnet-apphost-pack-8.0-8.0.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946462" comment="dotnet-host-8.0.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946463" comment="dotnet-hostfxr-8.0-8.0.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946464" comment="dotnet-runtime-8.0-8.0.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946465" comment="dotnet-runtime-dbg-8.0-8.0.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946466" comment="dotnet-sdk-8.0-8.0.110-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946467" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946468" comment="dotnet-sdk-dbg-8.0-8.0.110-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946469" comment="dotnet-targeting-pack-8.0-8.0.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946470" comment="dotnet-templates-8.0-8.0.110-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946471" comment="netstandard-targeting-pack-2.1-8.0.110-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4366" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7958.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7958.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947295" comment="firefox-128.3.1-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947296" comment="firefox-x11-128.3.1-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4367" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8025.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8025.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947412" comment="thunderbird-128.3.1-1.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4368" version="1" class="patch">
	<metadata>
		<title>security update for OpenIPMI (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-42934" ref_url="https://www.suse.com/security/cve/CVE-2024-42934/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8037.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8037.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42934/">CVE-2024-42934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42934">CVE-2024-42934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947336" comment="OpenIPMI-2.0.32-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947337" comment="OpenIPMI-devel-2.0.32-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947338" comment="OpenIPMI-lanserv-2.0.32-5.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947339" comment="OpenIPMI-libs-2.0.32-5.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4369" version="1" class="patch">
	<metadata>
		<title>security update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8039.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8039.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947340" comment="podman-4.9.4-13.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947341" comment="podman-docker-4.9.4-13.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947342" comment="podman-plugins-4.9.4-13.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947343" comment="podman-remote-4.9.4-13.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947344" comment="podman-tests-4.9.4-13.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4370" version="1" class="patch">
	<metadata>
		<title>security update for containernetworking-plugins (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8110.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8110.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948303" comment="containernetworking-plugins-1.4.0-6.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4371" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8111.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8111.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948304" comment="skopeo-1.14.5-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948305" comment="skopeo-tests-1.14.5-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4372" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8112.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8112.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948496" comment="buildah-1.33.9-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948497" comment="buildah-tests-1.33.9-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4373" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-48161" ref_url="https://www.suse.com/security/cve/CVE-2023-48161/" source="CVE"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8117.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8117.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48161/">CVE-2023-48161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48161">CVE-2023-48161 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947853" comment="java-1.8.0-openjdk-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947854" comment="java-1.8.0-openjdk-accessibility-1.8.0.432.b06-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947855" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.432.b06-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947856" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.432.b06-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947857" comment="java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947858" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947859" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947860" comment="java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947861" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947862" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947863" comment="java-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947864" comment="java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947865" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947866" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947867" comment="java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947868" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947869" comment="java-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947870" comment="java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947871" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947872" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4374" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-48161" ref_url="https://www.suse.com/security/cve/CVE-2023-48161/" source="CVE"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8121.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8121.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48161/">CVE-2023-48161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48161">CVE-2023-48161 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947743" comment="java-11-openjdk-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947744" comment="java-11-openjdk-demo-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947745" comment="java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947746" comment="java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947747" comment="java-11-openjdk-devel-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947748" comment="java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947749" comment="java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947750" comment="java-11-openjdk-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947751" comment="java-11-openjdk-headless-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947752" comment="java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947753" comment="java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947754" comment="java-11-openjdk-javadoc-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947755" comment="java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947756" comment="java-11-openjdk-jmods-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947757" comment="java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947758" comment="java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947759" comment="java-11-openjdk-slowdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947760" comment="java-11-openjdk-src-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947761" comment="java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947762" comment="java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947763" comment="java-11-openjdk-static-libs-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947764" comment="java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947765" comment="java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4375" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-48161" ref_url="https://www.suse.com/security/cve/CVE-2023-48161/" source="CVE"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8124.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8124.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48161/">CVE-2023-48161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48161">CVE-2023-48161 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947873" comment="java-17-openjdk-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947874" comment="java-17-openjdk-demo-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947875" comment="java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947876" comment="java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947877" comment="java-17-openjdk-devel-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947878" comment="java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947879" comment="java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947880" comment="java-17-openjdk-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947881" comment="java-17-openjdk-headless-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947882" comment="java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947883" comment="java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947884" comment="java-17-openjdk-javadoc-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947885" comment="java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947886" comment="java-17-openjdk-jmods-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947887" comment="java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947888" comment="java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947889" comment="java-17-openjdk-slowdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947890" comment="java-17-openjdk-src-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947891" comment="java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947892" comment="java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947893" comment="java-17-openjdk-static-libs-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947894" comment="java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947895" comment="java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4376" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-48161" ref_url="https://www.suse.com/security/cve/CVE-2023-48161/" source="CVE"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8127.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8127.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48161/">CVE-2023-48161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48161">CVE-2023-48161 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948242" comment="java-21-openjdk-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948243" comment="java-21-openjdk-demo-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948244" comment="java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948245" comment="java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948246" comment="java-21-openjdk-devel-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948247" comment="java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948248" comment="java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948249" comment="java-21-openjdk-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948250" comment="java-21-openjdk-headless-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948251" comment="java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948252" comment="java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948253" comment="java-21-openjdk-javadoc-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948254" comment="java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948255" comment="java-21-openjdk-jmods-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948256" comment="java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948257" comment="java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948258" comment="java-21-openjdk-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948259" comment="java-21-openjdk-src-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948260" comment="java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948261" comment="java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948262" comment="java-21-openjdk-static-libs-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948263" comment="java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948264" comment="java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4377" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-47385" ref_url="https://www.suse.com/security/cve/CVE-2021-47385/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-52658" ref_url="https://www.suse.com/security/cve/CVE-2023-52658/" source="CVE"/>
		<reference ref_id="CVE-2024-27403" ref_url="https://www.suse.com/security/cve/CVE-2024-27403/" source="CVE"/>
		<reference ref_id="CVE-2024-35989" ref_url="https://www.suse.com/security/cve/CVE-2024-35989/" source="CVE"/>
		<reference ref_id="CVE-2024-36889" ref_url="https://www.suse.com/security/cve/CVE-2024-36889/" source="CVE"/>
		<reference ref_id="CVE-2024-36978" ref_url="https://www.suse.com/security/cve/CVE-2024-36978/" source="CVE"/>
		<reference ref_id="CVE-2024-38556" ref_url="https://www.suse.com/security/cve/CVE-2024-38556/" source="CVE"/>
		<reference ref_id="CVE-2024-39483" ref_url="https://www.suse.com/security/cve/CVE-2024-39483/" source="CVE"/>
		<reference ref_id="CVE-2024-39502" ref_url="https://www.suse.com/security/cve/CVE-2024-39502/" source="CVE"/>
		<reference ref_id="CVE-2024-40959" ref_url="https://www.suse.com/security/cve/CVE-2024-40959/" source="CVE"/>
		<reference ref_id="CVE-2024-42079" ref_url="https://www.suse.com/security/cve/CVE-2024-42079/" source="CVE"/>
		<reference ref_id="CVE-2024-42272" ref_url="https://www.suse.com/security/cve/CVE-2024-42272/" source="CVE"/>
		<reference ref_id="CVE-2024-42284" ref_url="https://www.suse.com/security/cve/CVE-2024-42284/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8162.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8162.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47385/">CVE-2021-47385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47385">CVE-2021-47385 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52658/">CVE-2023-52658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52658">CVE-2023-52658 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27403/">CVE-2024-27403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27403">CVE-2024-27403 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35989/">CVE-2024-35989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35989">CVE-2024-35989 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36889/">CVE-2024-36889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36889">CVE-2024-36889 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36978/">CVE-2024-36978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36978">CVE-2024-36978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38556/">CVE-2024-38556 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38556">CVE-2024-38556 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39483/">CVE-2024-39483 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39483">CVE-2024-39483 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39502/">CVE-2024-39502 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39502">CVE-2024-39502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40959/">CVE-2024-40959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40959">CVE-2024-40959 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42079/">CVE-2024-42079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42079">CVE-2024-42079 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42272/">CVE-2024-42272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42272">CVE-2024-42272 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42284/">CVE-2024-42284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42284">CVE-2024-42284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4378" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-43010" ref_url="https://www.suse.com/security/cve/CVE-2023-43010/" source="CVE"/>
		<reference ref_id="CVE-2024-23254" ref_url="https://www.suse.com/security/cve/CVE-2024-23254/" source="CVE"/>
		<reference ref_id="CVE-2024-23263" ref_url="https://www.suse.com/security/cve/CVE-2024-23263/" source="CVE"/>
		<reference ref_id="CVE-2024-23280" ref_url="https://www.suse.com/security/cve/CVE-2024-23280/" source="CVE"/>
		<reference ref_id="CVE-2024-23284" ref_url="https://www.suse.com/security/cve/CVE-2024-23284/" source="CVE"/>
		<reference ref_id="CVE-2024-27820" ref_url="https://www.suse.com/security/cve/CVE-2024-27820/" source="CVE"/>
		<reference ref_id="CVE-2024-27838" ref_url="https://www.suse.com/security/cve/CVE-2024-27838/" source="CVE"/>
		<reference ref_id="CVE-2024-27851" ref_url="https://www.suse.com/security/cve/CVE-2024-27851/" source="CVE"/>
		<reference ref_id="CVE-2024-27856" ref_url="https://www.suse.com/security/cve/CVE-2024-27856/" source="CVE"/>
		<reference ref_id="CVE-2024-40776" ref_url="https://www.suse.com/security/cve/CVE-2024-40776/" source="CVE"/>
		<reference ref_id="CVE-2024-40779" ref_url="https://www.suse.com/security/cve/CVE-2024-40779/" source="CVE"/>
		<reference ref_id="CVE-2024-40780" ref_url="https://www.suse.com/security/cve/CVE-2024-40780/" source="CVE"/>
		<reference ref_id="CVE-2024-40782" ref_url="https://www.suse.com/security/cve/CVE-2024-40782/" source="CVE"/>
		<reference ref_id="CVE-2024-40789" ref_url="https://www.suse.com/security/cve/CVE-2024-40789/" source="CVE"/>
		<reference ref_id="CVE-2024-40866" ref_url="https://www.suse.com/security/cve/CVE-2024-40866/" source="CVE"/>
		<reference ref_id="CVE-2024-44185" ref_url="https://www.suse.com/security/cve/CVE-2024-44185/" source="CVE"/>
		<reference ref_id="CVE-2024-44187" ref_url="https://www.suse.com/security/cve/CVE-2024-44187/" source="CVE"/>
		<reference ref_id="CVE-2024-4558" ref_url="https://www.suse.com/security/cve/CVE-2024-4558/" source="CVE"/>
		<reference ref_id="CVE-2024-54534" ref_url="https://www.suse.com/security/cve/CVE-2024-54534/" source="CVE"/>
		<reference ref_id="CVE-2025-43480" ref_url="https://www.suse.com/security/cve/CVE-2025-43480/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8180.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8180.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-43010/">CVE-2023-43010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43010">CVE-2023-43010 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23254/">CVE-2024-23254 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23254">CVE-2024-23254 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23263/">CVE-2024-23263 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23263">CVE-2024-23263 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23280/">CVE-2024-23280 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23280">CVE-2024-23280 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23284/">CVE-2024-23284 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23284">CVE-2024-23284 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27820/">CVE-2024-27820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27820">CVE-2024-27820 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27838/">CVE-2024-27838 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27838">CVE-2024-27838 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27851/">CVE-2024-27851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27851">CVE-2024-27851 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-27856/">CVE-2024-27856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27856">CVE-2024-27856 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-40776/">CVE-2024-40776 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40776">CVE-2024-40776 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40779/">CVE-2024-40779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40779">CVE-2024-40779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40780/">CVE-2024-40780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40780">CVE-2024-40780 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40782/">CVE-2024-40782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40782">CVE-2024-40782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40789/">CVE-2024-40789 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40789">CVE-2024-40789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-40866/">CVE-2024-40866 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40866">CVE-2024-40866 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44185/">CVE-2024-44185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44185">CVE-2024-44185 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-44187/">CVE-2024-44187 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44187">CVE-2024-44187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4558/">CVE-2024-4558 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4558">CVE-2024-4558 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54534/">CVE-2024-54534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54534">CVE-2024-54534 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43480/">CVE-2025-43480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43480">CVE-2025-43480 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4379" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8374.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8374.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948432" comment="python3.11-3.11.7-1.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948433" comment="python3.11-debug-3.11.7-1.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948434" comment="python3.11-devel-3.11.7-1.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948435" comment="python3.11-idle-3.11.7-1.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948436" comment="python3.11-libs-3.11.7-1.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948437" comment="python3.11-test-3.11.7-1.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948438" comment="python3.11-tkinter-3.11.7-1.el9_4.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4380" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8446.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8446.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948439" comment="python-unversioned-command-3.9.18-3.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948440" comment="python3-3.9.18-3.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948441" comment="python3-debug-3.9.18-3.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948442" comment="python3-devel-3.9.18-3.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948443" comment="python3-idle-3.9.18-3.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948444" comment="python3-libs-3.9.18-3.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948445" comment="python3-test-3.9.18-3.el9_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948446" comment="python3-tkinter-3.9.18-3.el9_4.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4381" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8447.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8447.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948447" comment="python3.12-3.12.1-4.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948448" comment="python3.12-debug-3.12.1-4.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948449" comment="python3.12-devel-3.12.1-4.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948450" comment="python3.12-idle-3.12.1-4.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948451" comment="python3.12-libs-3.12.1-4.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948452" comment="python3.12-test-3.12.1-4.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948453" comment="python3.12-tkinter-3.12.1-4.el9_4.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4382" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8563.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8563.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948625" comment="buildah-1.33.10-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948626" comment="buildah-tests-1.33.10-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4383" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-47383" ref_url="https://www.suse.com/security/cve/CVE-2021-47383/" source="CVE"/>
		<reference ref_id="CVE-2023-54153" ref_url="https://www.suse.com/security/cve/CVE-2023-54153/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-26640" ref_url="https://www.suse.com/security/cve/CVE-2024-26640/" source="CVE"/>
		<reference ref_id="CVE-2024-26826" ref_url="https://www.suse.com/security/cve/CVE-2024-26826/" source="CVE"/>
		<reference ref_id="CVE-2024-26923" ref_url="https://www.suse.com/security/cve/CVE-2024-26923/" source="CVE"/>
		<reference ref_id="CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935/" source="CVE"/>
		<reference ref_id="CVE-2024-26961" ref_url="https://www.suse.com/security/cve/CVE-2024-26961/" source="CVE"/>
		<reference ref_id="CVE-2024-36244" ref_url="https://www.suse.com/security/cve/CVE-2024-36244/" source="CVE"/>
		<reference ref_id="CVE-2024-39472" ref_url="https://www.suse.com/security/cve/CVE-2024-39472/" source="CVE"/>
		<reference ref_id="CVE-2024-39504" ref_url="https://www.suse.com/security/cve/CVE-2024-39504/" source="CVE"/>
		<reference ref_id="CVE-2024-40904" ref_url="https://www.suse.com/security/cve/CVE-2024-40904/" source="CVE"/>
		<reference ref_id="CVE-2024-40931" ref_url="https://www.suse.com/security/cve/CVE-2024-40931/" source="CVE"/>
		<reference ref_id="CVE-2024-40960" ref_url="https://www.suse.com/security/cve/CVE-2024-40960/" source="CVE"/>
		<reference ref_id="CVE-2024-40972" ref_url="https://www.suse.com/security/cve/CVE-2024-40972/" source="CVE"/>
		<reference ref_id="CVE-2024-40977" ref_url="https://www.suse.com/security/cve/CVE-2024-40977/" source="CVE"/>
		<reference ref_id="CVE-2024-40995" ref_url="https://www.suse.com/security/cve/CVE-2024-40995/" source="CVE"/>
		<reference ref_id="CVE-2024-40998" ref_url="https://www.suse.com/security/cve/CVE-2024-40998/" source="CVE"/>
		<reference ref_id="CVE-2024-41005" ref_url="https://www.suse.com/security/cve/CVE-2024-41005/" source="CVE"/>
		<reference ref_id="CVE-2024-41013" ref_url="https://www.suse.com/security/cve/CVE-2024-41013/" source="CVE"/>
		<reference ref_id="CVE-2024-41014" ref_url="https://www.suse.com/security/cve/CVE-2024-41014/" source="CVE"/>
		<reference ref_id="CVE-2024-43854" ref_url="https://www.suse.com/security/cve/CVE-2024-43854/" source="CVE"/>
		<reference ref_id="CVE-2024-45018" ref_url="https://www.suse.com/security/cve/CVE-2024-45018/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8617.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8617.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47383/">CVE-2021-47383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47383">CVE-2021-47383 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54153/">CVE-2023-54153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54153">CVE-2023-54153 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26640/">CVE-2024-26640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26640">CVE-2024-26640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26826/">CVE-2024-26826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26826">CVE-2024-26826 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26923/">CVE-2024-26923 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26923">CVE-2024-26923 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26961/">CVE-2024-26961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26961">CVE-2024-26961 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36244/">CVE-2024-36244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36244">CVE-2024-36244 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-39472/">CVE-2024-39472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39472">CVE-2024-39472 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39504/">CVE-2024-39504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39504">CVE-2024-39504 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40904/">CVE-2024-40904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40904">CVE-2024-40904 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40931/">CVE-2024-40931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40931">CVE-2024-40931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40960/">CVE-2024-40960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40960">CVE-2024-40960 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40972/">CVE-2024-40972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40972">CVE-2024-40972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40977/">CVE-2024-40977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40977">CVE-2024-40977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40995/">CVE-2024-40995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40995">CVE-2024-40995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40998/">CVE-2024-40998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40998">CVE-2024-40998 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-41005/">CVE-2024-41005 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41005">CVE-2024-41005 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41013/">CVE-2024-41013 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41013">CVE-2024-41013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41014/">CVE-2024-41014 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41014">CVE-2024-41014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43854/">CVE-2024-43854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45018/">CVE-2024-45018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45018">CVE-2024-45018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4384" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-47875" ref_url="https://www.suse.com/security/cve/CVE-2024-47875/" source="CVE"/>
		<reference ref_id="CVE-2024-9355" ref_url="https://www.suse.com/security/cve/CVE-2024-9355/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8678.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8678.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47875/">CVE-2024-47875 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47875">CVE-2024-47875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9355/">CVE-2024-9355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9355">CVE-2024-9355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950363" comment="grafana-9.2.10-19.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950364" comment="grafana-selinux-9.2.10-19.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4385" version="1" class="patch">
	<metadata>
		<title>security update for mod_http2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-36387" ref_url="https://www.suse.com/security/cve/CVE-2024-36387/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8680.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8680.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36387/">CVE-2024-36387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36387">CVE-2024-36387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950377" comment="mod_http2-2.0.26-2.el9_4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4386" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8726.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8726.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950852" comment="firefox-128.4.0-1.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950853" comment="firefox-x11-128.4.0-1.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4387" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8793.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8793.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951425" comment="thunderbird-128.4.0-1.el9_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4388" version="1" class="patch">
	<metadata>
		<title>security update for openexr (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5841" ref_url="https://www.suse.com/security/cve/CVE-2023-5841/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8800.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8800.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-5841/">CVE-2023-5841 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5841">CVE-2023-5841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951338" comment="openexr-3.1.1-2.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951339" comment="openexr-devel-3.1.1-2.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951340" comment="openexr-libs-3.1.1-2.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4389" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-7006" ref_url="https://www.suse.com/security/cve/CVE-2024-7006/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8914.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8914.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7006/">CVE-2024-7006 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7006">CVE-2024-7006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951341" comment="libtiff-4.4.0-12.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951342" comment="libtiff-devel-4.4.0-12.el9_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951343" comment="libtiff-tools-4.4.0-12.el9_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4390" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6119" ref_url="https://www.suse.com/security/cve/CVE-2024-6119/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8935.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8935.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6119/">CVE-2024-6119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6119">CVE-2024-6119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951344" comment="edk2-ovmf-20231122-6.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951345" comment="edk2-tools-20231122-6.el9_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951346" comment="edk2-tools-doc-20231122-6.el9_4.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4391" version="1" class="patch">
	<metadata>
		<title>security update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<reference ref_id="CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9051.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9051.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951868" comment="podman-4.9.4-16.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951869" comment="podman-docker-4.9.4-16.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951870" comment="podman-plugins-4.9.4-16.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951871" comment="podman-remote-4.9.4-16.el9_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951872" comment="podman-tests-4.9.4-16.el9_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4392" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-6129" ref_url="https://www.suse.com/security/cve/CVE-2023-6129/" source="CVE"/>
		<reference ref_id="CVE-2023-6237" ref_url="https://www.suse.com/security/cve/CVE-2023-6237/" source="CVE"/>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<reference ref_id="CVE-2024-1298" ref_url="https://www.suse.com/security/cve/CVE-2024-1298/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9088.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9088.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6129/">CVE-2023-6129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6129">CVE-2023-6129 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6237/">CVE-2023-6237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6237">CVE-2023-6237 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1298/">CVE-2024-1298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1298">CVE-2024-1298 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953529" comment="edk2-ovmf-20240524-6.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953530" comment="edk2-tools-20240524-6.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953531" comment="edk2-tools-doc-20240524-6.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4393" version="1" class="patch">
	<metadata>
		<title>security update for containernetworking-plugins (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9089.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9089.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953532" comment="containernetworking-plugins-1.5.1-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4394" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-22211" ref_url="https://www.suse.com/security/cve/CVE-2024-22211/" source="CVE"/>
		<reference ref_id="CVE-2024-32039" ref_url="https://www.suse.com/security/cve/CVE-2024-32039/" source="CVE"/>
		<reference ref_id="CVE-2024-32040" ref_url="https://www.suse.com/security/cve/CVE-2024-32040/" source="CVE"/>
		<reference ref_id="CVE-2024-32041" ref_url="https://www.suse.com/security/cve/CVE-2024-32041/" source="CVE"/>
		<reference ref_id="CVE-2024-32458" ref_url="https://www.suse.com/security/cve/CVE-2024-32458/" source="CVE"/>
		<reference ref_id="CVE-2024-32459" ref_url="https://www.suse.com/security/cve/CVE-2024-32459/" source="CVE"/>
		<reference ref_id="CVE-2024-32460" ref_url="https://www.suse.com/security/cve/CVE-2024-32460/" source="CVE"/>
		<reference ref_id="CVE-2024-32658" ref_url="https://www.suse.com/security/cve/CVE-2024-32658/" source="CVE"/>
		<reference ref_id="CVE-2024-32659" ref_url="https://www.suse.com/security/cve/CVE-2024-32659/" source="CVE"/>
		<reference ref_id="CVE-2024-32660" ref_url="https://www.suse.com/security/cve/CVE-2024-32660/" source="CVE"/>
		<reference ref_id="CVE-2024-32661" ref_url="https://www.suse.com/security/cve/CVE-2024-32661/" source="CVE"/>
		<reference ref_id="CVE-2024-32662" ref_url="https://www.suse.com/security/cve/CVE-2024-32662/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9092.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9092.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-22211/">CVE-2024-22211 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22211">CVE-2024-22211 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32039/">CVE-2024-32039 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32039">CVE-2024-32039 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-32040/">CVE-2024-32040 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32040">CVE-2024-32040 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32041/">CVE-2024-32041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32041">CVE-2024-32041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32458/">CVE-2024-32458 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32458">CVE-2024-32458 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32459/">CVE-2024-32459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32459">CVE-2024-32459 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32460/">CVE-2024-32460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32460">CVE-2024-32460 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32658/">CVE-2024-32658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32658">CVE-2024-32658 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32659/">CVE-2024-32659 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32659">CVE-2024-32659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32660/">CVE-2024-32660 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32660">CVE-2024-32660 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32661/">CVE-2024-32661 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32661">CVE-2024-32661 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-32662/">CVE-2024-32662 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32662">CVE-2024-32662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953533" comment="freerdp-2.11.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953534" comment="freerdp-devel-2.11.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953535" comment="freerdp-libs-2.11.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953536" comment="libwinpr-2.11.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953537" comment="libwinpr-devel-2.11.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4395" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server-Xwayland (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9093.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9093.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953538" comment="xorg-x11-server-Xwayland-23.2.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953539" comment="xorg-x11-server-Xwayland-devel-23.2.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4396" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9097.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9097.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953540" comment="buildah-1.37.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953541" comment="buildah-tests-1.37.2-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4397" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9098.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9098.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953542" comment="skopeo-1.16.1-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953543" comment="skopeo-tests-1.16.1-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4398" version="1" class="patch">
	<metadata>
		<title>security update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-4122" ref_url="https://www.suse.com/security/cve/CVE-2022-4122/" source="CVE"/>
		<reference ref_id="CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789/" source="CVE"/>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9102.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9102.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4122/">CVE-2022-4122 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4122">CVE-2022-4122 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953544" comment="podman-5.2.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953545" comment="podman-docker-5.2.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953546" comment="podman-plugins-5.2.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953547" comment="podman-remote-5.2.2-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953548" comment="podman-tests-5.2.2-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4399" version="1" class="patch">
	<metadata>
		<title>security update for gnome-shell (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-36472" ref_url="https://www.suse.com/security/cve/CVE-2024-36472/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9114.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9114.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36472/">CVE-2024-36472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36472">CVE-2024-36472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953549" comment="gnome-classic-session-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953550" comment="gnome-shell-40.10-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953551" comment="gnome-shell-extension-apps-menu-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953552" comment="gnome-shell-extension-auto-move-windows-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953553" comment="gnome-shell-extension-classification-banner-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953554" comment="gnome-shell-extension-common-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953555" comment="gnome-shell-extension-custom-menu-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953556" comment="gnome-shell-extension-dash-to-dock-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953557" comment="gnome-shell-extension-dash-to-panel-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953558" comment="gnome-shell-extension-desktop-icons-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953559" comment="gnome-shell-extension-drive-menu-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953560" comment="gnome-shell-extension-gesture-inhibitor-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953561" comment="gnome-shell-extension-heads-up-display-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953562" comment="gnome-shell-extension-launch-new-instance-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953563" comment="gnome-shell-extension-native-window-placement-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953564" comment="gnome-shell-extension-panel-favorites-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953565" comment="gnome-shell-extension-places-menu-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953566" comment="gnome-shell-extension-screenshot-window-sizer-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953567" comment="gnome-shell-extension-systemMonitor-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953568" comment="gnome-shell-extension-top-icons-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953569" comment="gnome-shell-extension-updates-dialog-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953570" comment="gnome-shell-extension-user-theme-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953571" comment="gnome-shell-extension-window-list-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953572" comment="gnome-shell-extension-windowsNavigator-40.7-19.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953573" comment="gnome-shell-extension-workspace-indicator-40.7-19.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4400" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<reference ref_id="CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789/" source="CVE"/>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9115.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9115.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953574" comment="grafana-10.2.6-4.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953575" comment="grafana-selinux-10.2.6-4.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4401" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9122.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9122.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953576" comment="xorg-x11-server-Xdmx-1.20.11-26.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953577" comment="xorg-x11-server-Xephyr-1.20.11-26.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953578" comment="xorg-x11-server-Xnest-1.20.11-26.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953579" comment="xorg-x11-server-Xorg-1.20.11-26.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953580" comment="xorg-x11-server-Xvfb-1.20.11-26.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953581" comment="xorg-x11-server-common-1.20.11-26.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953582" comment="xorg-x11-server-devel-1.20.11-26.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953583" comment="xorg-x11-server-source-1.20.11-26.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4402" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-8235" ref_url="https://www.suse.com/security/cve/CVE-2024-8235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9128.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9128.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8235/">CVE-2024-8235 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8235">CVE-2024-8235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953584" comment="libvirt-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953585" comment="libvirt-client-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953586" comment="libvirt-client-qemu-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953587" comment="libvirt-daemon-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953588" comment="libvirt-daemon-common-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953589" comment="libvirt-daemon-config-network-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953590" comment="libvirt-daemon-config-nwfilter-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953591" comment="libvirt-daemon-driver-interface-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953592" comment="libvirt-daemon-driver-network-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953593" comment="libvirt-daemon-driver-nodedev-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953594" comment="libvirt-daemon-driver-nwfilter-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953595" comment="libvirt-daemon-driver-qemu-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953596" comment="libvirt-daemon-driver-secret-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953597" comment="libvirt-daemon-driver-storage-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953598" comment="libvirt-daemon-driver-storage-core-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953599" comment="libvirt-daemon-driver-storage-disk-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953600" comment="libvirt-daemon-driver-storage-iscsi-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953601" comment="libvirt-daemon-driver-storage-logical-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953602" comment="libvirt-daemon-driver-storage-mpath-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953603" comment="libvirt-daemon-driver-storage-rbd-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953604" comment="libvirt-daemon-driver-storage-scsi-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953605" comment="libvirt-daemon-kvm-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953606" comment="libvirt-daemon-lock-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953607" comment="libvirt-daemon-log-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953608" comment="libvirt-daemon-plugin-lockd-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953609" comment="libvirt-daemon-plugin-sanlock-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953610" comment="libvirt-daemon-proxy-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953611" comment="libvirt-devel-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953612" comment="libvirt-docs-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953613" comment="libvirt-libs-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953614" comment="libvirt-nss-10.5.0-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953615" comment="libvirt-ssh-proxy-10.5.0-7.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4403" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-26327" ref_url="https://www.suse.com/security/cve/CVE-2024-26327/" source="CVE"/>
		<reference ref_id="CVE-2024-3446" ref_url="https://www.suse.com/security/cve/CVE-2024-3446/" source="CVE"/>
		<reference ref_id="CVE-2024-7409" ref_url="https://www.suse.com/security/cve/CVE-2024-7409/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9136.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9136.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26327/">CVE-2024-26327 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26327">CVE-2024-26327 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3446/">CVE-2024-3446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3446">CVE-2024-3446 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7409/">CVE-2024-7409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7409">CVE-2024-7409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953616" comment="qemu-guest-agent-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953617" comment="qemu-img-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953618" comment="qemu-kvm-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953619" comment="qemu-kvm-audio-pa-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953620" comment="qemu-kvm-block-blkio-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953621" comment="qemu-kvm-block-curl-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953622" comment="qemu-kvm-block-rbd-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953623" comment="qemu-kvm-common-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953624" comment="qemu-kvm-core-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953625" comment="qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953626" comment="qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953627" comment="qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953628" comment="qemu-kvm-device-usb-host-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953629" comment="qemu-kvm-device-usb-redirect-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953630" comment="qemu-kvm-docs-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953631" comment="qemu-kvm-tools-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953632" comment="qemu-kvm-ui-egl-headless-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953633" comment="qemu-kvm-ui-opengl-9.0.0-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953634" comment="qemu-pr-helper-9.0.0-10.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4404" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-42843" ref_url="https://www.suse.com/security/cve/CVE-2023-42843/" source="CVE"/>
		<reference ref_id="CVE-2023-42950" ref_url="https://www.suse.com/security/cve/CVE-2023-42950/" source="CVE"/>
		<reference ref_id="CVE-2023-42956" ref_url="https://www.suse.com/security/cve/CVE-2023-42956/" source="CVE"/>
		<reference ref_id="CVE-2024-4558" ref_url="https://www.suse.com/security/cve/CVE-2024-4558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9144.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9144.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-42843/">CVE-2023-42843 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42843">CVE-2023-42843 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42950/">CVE-2023-42950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42950">CVE-2023-42950 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42956/">CVE-2023-42956 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42956">CVE-2023-42956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4558/">CVE-2024-4558 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4558">CVE-2024-4558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953635" comment="webkit2gtk3-2.44.3-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953636" comment="webkit2gtk3-devel-2.44.3-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953637" comment="webkit2gtk3-jsc-2.44.3-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953638" comment="webkit2gtk3-jsc-devel-2.44.3-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4405" version="1" class="patch">
	<metadata>
		<title>security update for python-jinja2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34064" ref_url="https://www.suse.com/security/cve/CVE-2024-34064/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9150.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9150.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34064/">CVE-2024-34064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34064">CVE-2024-34064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953639" comment="python3-jinja2-2.11.3-6.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4406" version="1" class="patch">
	<metadata>
		<title>security update for lldpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<reference ref_id="CVE-2021-43612" ref_url="https://www.suse.com/security/cve/CVE-2021-43612/" source="CVE"/>
		<reference ref_id="CVE-2023-41910" ref_url="https://www.suse.com/security/cve/CVE-2023-41910/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9158.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9158.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27827">CVE-2020-27827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43612/">CVE-2021-43612 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43612">CVE-2021-43612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-41910/">CVE-2023-41910 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41910">CVE-2023-41910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953640" comment="lldpd-1.0.18-4.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953641" comment="lldpd-devel-1.0.18-4.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4407" version="1" class="patch">
	<metadata>
		<title>security update for poppler (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6239" ref_url="https://www.suse.com/security/cve/CVE-2024-6239/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9167.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9167.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6239/">CVE-2024-6239 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6239">CVE-2024-6239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953642" comment="poppler-21.01.0-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953643" comment="poppler-cpp-21.01.0-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953644" comment="poppler-cpp-devel-21.01.0-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953645" comment="poppler-devel-21.01.0-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953646" comment="poppler-glib-21.01.0-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953647" comment="poppler-glib-devel-21.01.0-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953648" comment="poppler-glib-doc-21.01.0-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953649" comment="poppler-qt5-21.01.0-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953650" comment="poppler-qt5-devel-21.01.0-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953651" comment="poppler-utils-21.01.0-21.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4408" version="1" class="patch">
	<metadata>
		<title>security update for mod_auth_openidc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24814" ref_url="https://www.suse.com/security/cve/CVE-2024-24814/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9180.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9180.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24814/">CVE-2024-24814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24814">CVE-2024-24814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953652" comment="mod_auth_openidc-2.4.10-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4409" version="1" class="patch">
	<metadata>
		<title>security update for jose (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-50967" ref_url="https://www.suse.com/security/cve/CVE-2023-50967/" source="CVE"/>
		<reference ref_id="CVE-2024-28176" ref_url="https://www.suse.com/security/cve/CVE-2024-28176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9181.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9181.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50967/">CVE-2023-50967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50967">CVE-2023-50967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28176/">CVE-2024-28176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28176">CVE-2024-28176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953653" comment="jose-14-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953654" comment="libjose-14-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953655" comment="libjose-devel-14-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4410" version="1" class="patch">
	<metadata>
		<title>security update for gtk3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6655" ref_url="https://www.suse.com/security/cve/CVE-2024-6655/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9184.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9184.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6655/">CVE-2024-6655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6655">CVE-2024-6655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953656" comment="gtk-update-icon-cache-3.24.31-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953657" comment="gtk3-3.24.31-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953658" comment="gtk3-devel-3.24.31-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953659" comment="gtk3-devel-docs-3.24.31-5.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953660" comment="gtk3-immodule-xim-3.24.31-5.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4411" version="1" class="patch">
	<metadata>
		<title>security update for iperf3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-7250" ref_url="https://www.suse.com/security/cve/CVE-2023-7250/" source="CVE"/>
		<reference ref_id="CVE-2024-26306" ref_url="https://www.suse.com/security/cve/CVE-2024-26306/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9185.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9185.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-7250/">CVE-2023-7250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7250">CVE-2023-7250 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26306/">CVE-2024-26306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26306">CVE-2024-26306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953661" comment="iperf3-3.9-13.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4412" version="1" class="patch">
	<metadata>
		<title>security update for bcc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2314" ref_url="https://www.suse.com/security/cve/CVE-2024-2314/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9187.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9187.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2314/">CVE-2024-2314 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2314">CVE-2024-2314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953662" comment="bcc-0.30.0-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953663" comment="bcc-devel-0.30.0-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953664" comment="bcc-doc-0.30.0-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953665" comment="bcc-tools-0.30.0-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953666" comment="libbpf-tools-0.30.0-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953667" comment="python3-bcc-0.30.0-6.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4413" version="1" class="patch">
	<metadata>
		<title>security update for bpftrace (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2313" ref_url="https://www.suse.com/security/cve/CVE-2024-2313/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9188.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9188.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2313/">CVE-2024-2313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2313">CVE-2024-2313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953668" comment="bpftrace-0.21.1-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4414" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9190.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9190.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953669" comment="python3.12-3.12.5-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953670" comment="python3.12-debug-3.12.5-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953671" comment="python3.12-devel-3.12.5-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953672" comment="python3.12-idle-3.12.5-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953673" comment="python3.12-libs-3.12.5-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953674" comment="python3.12-test-3.12.5-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953675" comment="python3.12-tkinter-3.12.5-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4415" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9192.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9192.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951961" comment="python3.11-3.11.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951962" comment="python3.11-debug-3.11.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951963" comment="python3.11-devel-3.11.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951964" comment="python3.11-idle-3.11.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951965" comment="python3.11-libs-3.11.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951966" comment="python3.11-test-3.11.9-7.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951967" comment="python3.11-tkinter-3.11.9-7.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4416" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-PyMySQL (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-36039" ref_url="https://www.suse.com/security/cve/CVE-2024-36039/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9193.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9193.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36039/">CVE-2024-36039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36039">CVE-2024-36039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953676" comment="python3.12-PyMySQL-1.1.0-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953677" comment="python3.12-PyMySQL+rsa-1.1.0-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4417" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-PyMySQL (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-36039" ref_url="https://www.suse.com/security/cve/CVE-2024-36039/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9194.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9194.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36039/">CVE-2024-36039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36039">CVE-2024-36039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953678" comment="python3.11-PyMySQL-1.0.2-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953679" comment="python3.11-PyMySQL+rsa-1.0.2-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4418" version="1" class="patch">
	<metadata>
		<title>security update for cyrus-imapd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34055" ref_url="https://www.suse.com/security/cve/CVE-2024-34055/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9195.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9195.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34055/">CVE-2024-34055 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-34055">CVE-2024-34055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953680" comment="cyrus-imapd-3.4.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953681" comment="cyrus-imapd-libs-3.4.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953682" comment="cyrus-imapd-utils-3.4.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953683" comment="perl-Cyrus-3.4.8-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4419" version="1" class="patch">
	<metadata>
		<title>security update for runc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9200.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9200.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953684" comment="runc-1.1.13-4.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4420" version="1" class="patch">
	<metadata>
		<title>security update for postfix (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-51764" ref_url="https://www.suse.com/security/cve/CVE-2023-51764/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9243.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9243.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51764/">CVE-2023-51764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51764">CVE-2023-51764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953685" comment="postfix-3.5.25-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953686" comment="postfix-cdb-3.5.25-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953687" comment="postfix-ldap-3.5.25-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953688" comment="postfix-lmdb-3.5.25-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953689" comment="postfix-mysql-3.5.25-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953690" comment="postfix-pcre-3.5.25-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953691" comment="postfix-perl-scripts-3.5.25-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953692" comment="postfix-pgsql-3.5.25-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953693" comment="postfix-sqlite-3.5.25-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4421" version="1" class="patch">
	<metadata>
		<title>security update for oci-seccomp-bpf-hook (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9277.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9277.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953694" comment="oci-seccomp-bpf-hook-1.2.10-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4422" version="1" class="patch">
	<metadata>
		<title>security update for python-jwcrypto (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-6681" ref_url="https://www.suse.com/security/cve/CVE-2023-6681/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9281.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9281.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-6681/">CVE-2023-6681 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6681">CVE-2023-6681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953695" comment="python3-jwcrypto-1.5.6-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4423" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-30203" ref_url="https://www.suse.com/security/cve/CVE-2024-30203/" source="CVE"/>
		<reference ref_id="CVE-2024-30204" ref_url="https://www.suse.com/security/cve/CVE-2024-30204/" source="CVE"/>
		<reference ref_id="CVE-2024-30205" ref_url="https://www.suse.com/security/cve/CVE-2024-30205/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9302.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9302.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30203/">CVE-2024-30203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30203">CVE-2024-30203 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30204/">CVE-2024-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30204">CVE-2024-30204 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30205/">CVE-2024-30205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30205">CVE-2024-30205 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953696" comment="emacs-27.2-10.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953697" comment="emacs-common-27.2-10.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953698" comment="emacs-filesystem-27.2-10.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953699" comment="emacs-lucid-27.2-10.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953700" comment="emacs-nox-27.2-10.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4424" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-38709" ref_url="https://www.suse.com/security/cve/CVE-2023-38709/" source="CVE"/>
		<reference ref_id="CVE-2024-24795" ref_url="https://www.suse.com/security/cve/CVE-2024-24795/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9306.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9306.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-38709/">CVE-2023-38709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38709">CVE-2023-38709 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-24795/">CVE-2024-24795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24795">CVE-2024-24795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953701" comment="httpd-2.4.62-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953702" comment="httpd-core-2.4.62-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953703" comment="httpd-devel-2.4.62-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953704" comment="httpd-filesystem-2.4.62-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953705" comment="httpd-manual-2.4.62-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953706" comment="httpd-tools-2.4.62-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953707" comment="mod_ldap-2.4.62-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953708" comment="mod_lua-2.4.62-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953709" comment="mod_proxy_html-2.4.62-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953710" comment="mod_session-2.4.62-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953711" comment="mod_ssl-2.4.62-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4425" version="1" class="patch">
	<metadata>
		<title>security update for NetworkManager (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6501" ref_url="https://www.suse.com/security/cve/CVE-2024-6501/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9317.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9317.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6501/">CVE-2024-6501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6501">CVE-2024-6501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953712" comment="NetworkManager-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953713" comment="NetworkManager-adsl-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953714" comment="NetworkManager-bluetooth-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953715" comment="NetworkManager-cloud-setup-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953716" comment="NetworkManager-config-connectivity-suse-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953717" comment="NetworkManager-config-server-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953718" comment="NetworkManager-dispatcher-routing-rules-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953719" comment="NetworkManager-initscripts-updown-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953720" comment="NetworkManager-libnm-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953721" comment="NetworkManager-libnm-devel-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953722" comment="NetworkManager-ovs-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953723" comment="NetworkManager-ppp-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953724" comment="NetworkManager-team-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953725" comment="NetworkManager-tui-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953726" comment="NetworkManager-wifi-1.48.10-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953727" comment="NetworkManager-wwan-1.48.10-2.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4426" version="1" class="patch">
	<metadata>
		<title>security update for cockpit (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6126" ref_url="https://www.suse.com/security/cve/CVE-2024-6126/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9325.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9325.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-6126/">CVE-2024-6126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6126">CVE-2024-6126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953728" comment="cockpit-323.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953729" comment="cockpit-bridge-323.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953730" comment="cockpit-doc-323.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953731" comment="cockpit-packagekit-323.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953732" comment="cockpit-pcp-323.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953733" comment="cockpit-storaged-323.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953734" comment="cockpit-system-323.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953735" comment="cockpit-ws-323.1-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4427" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-26458" ref_url="https://www.suse.com/security/cve/CVE-2024-26458/" source="CVE"/>
		<reference ref_id="CVE-2024-26461" ref_url="https://www.suse.com/security/cve/CVE-2024-26461/" source="CVE"/>
		<reference ref_id="CVE-2024-26462" ref_url="https://www.suse.com/security/cve/CVE-2024-26462/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9331.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9331.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26458/">CVE-2024-26458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">CVE-2024-26458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26461/">CVE-2024-26461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26462/">CVE-2024-26462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">CVE-2024-26462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953736" comment="krb5-devel-1.21.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953737" comment="krb5-libs-1.21.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953738" comment="krb5-pkinit-1.21.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953739" comment="krb5-server-1.21.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953740" comment="krb5-server-ldap-1.21.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953741" comment="krb5-workstation-1.21.1-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953742" comment="libkadm5-1.21.1-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4428" version="1" class="patch">
	<metadata>
		<title>Low: openssl and openssl-fips-provider security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2511" ref_url="https://www.suse.com/security/cve/CVE-2024-2511/" source="CVE"/>
		<reference ref_id="CVE-2024-4603" ref_url="https://www.suse.com/security/cve/CVE-2024-4603/" source="CVE"/>
		<reference ref_id="CVE-2024-4741" ref_url="https://www.suse.com/security/cve/CVE-2024-4741/" source="CVE"/>
		<reference ref_id="CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9333. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024:9333		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2511/">CVE-2024-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4603/">CVE-2024-4603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4603">CVE-2024-4603 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4741/">CVE-2024-4741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953743" comment="openssl-3.2.2-6.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953744" comment="openssl-devel-3.2.2-6.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953745" comment="openssl-fips-provider-3.0.7-6.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953746" comment="openssl-fips-provider-so-3.0.7-6.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953747" comment="openssl-libs-3.2.2-6.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953748" comment="openssl-perl-3.2.2-6.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4429" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9371.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9371.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951968" comment="python-unversioned-command-3.9.19-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951969" comment="python3-3.9.19-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951970" comment="python3-debug-3.9.19-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951971" comment="python3-devel-3.9.19-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951972" comment="python3-idle-3.9.19-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951973" comment="python3-libs-3.9.19-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951974" comment="python3-test-3.9.19-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951975" comment="python3-tkinter-3.9.19-8.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4430" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-22655" ref_url="https://www.suse.com/security/cve/CVE-2023-22655/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-38575" ref_url="https://www.suse.com/security/cve/CVE-2023-38575/" source="CVE"/>
		<reference ref_id="CVE-2023-39368" ref_url="https://www.suse.com/security/cve/CVE-2023-39368/" source="CVE"/>
		<reference ref_id="CVE-2023-43490" ref_url="https://www.suse.com/security/cve/CVE-2023-43490/" source="CVE"/>
		<reference ref_id="CVE-2023-45733" ref_url="https://www.suse.com/security/cve/CVE-2023-45733/" source="CVE"/>
		<reference ref_id="CVE-2023-46103" ref_url="https://www.suse.com/security/cve/CVE-2023-46103/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9401.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9401.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22655/">CVE-2023-22655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38575/">CVE-2023-38575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39368/">CVE-2023-39368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-43490/">CVE-2023-43490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45733/">CVE-2023-45733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46103/">CVE-2023-46103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954004" comment="microcode_ctl-20240910-1.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4431" version="1" class="patch">
	<metadata>
		<title>security update for libgcrypt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-2236" ref_url="https://www.suse.com/security/cve/CVE-2024-2236/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9404.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9404.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2236/">CVE-2024-2236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2236">CVE-2024-2236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953749" comment="libgcrypt-1.10.0-11.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953750" comment="libgcrypt-devel-1.10.0-11.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4432" version="1" class="patch">
	<metadata>
		<title>security update for vim (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2021-3903" ref_url="https://www.suse.com/security/cve/CVE-2021-3903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9405.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9405.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3903/">CVE-2021-3903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3903">CVE-2021-3903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953751" comment="vim-X11-8.2.2637-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953752" comment="vim-common-8.2.2637-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953753" comment="vim-enhanced-8.2.2637-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953754" comment="vim-filesystem-8.2.2637-21.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953755" comment="vim-minimal-8.2.2637-21.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4433" version="1" class="patch">
	<metadata>
		<title>security update for bluez (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-27349" ref_url="https://www.suse.com/security/cve/CVE-2023-27349/" source="CVE"/>
		<reference ref_id="CVE-2023-44431" ref_url="https://www.suse.com/security/cve/CVE-2023-44431/" source="CVE"/>
		<reference ref_id="CVE-2023-45866" ref_url="https://www.suse.com/security/cve/CVE-2023-45866/" source="CVE"/>
		<reference ref_id="CVE-2023-50229" ref_url="https://www.suse.com/security/cve/CVE-2023-50229/" source="CVE"/>
		<reference ref_id="CVE-2023-50230" ref_url="https://www.suse.com/security/cve/CVE-2023-50230/" source="CVE"/>
		<reference ref_id="CVE-2023-51580" ref_url="https://www.suse.com/security/cve/CVE-2023-51580/" source="CVE"/>
		<reference ref_id="CVE-2023-51589" ref_url="https://www.suse.com/security/cve/CVE-2023-51589/" source="CVE"/>
		<reference ref_id="CVE-2023-51592" ref_url="https://www.suse.com/security/cve/CVE-2023-51592/" source="CVE"/>
		<reference ref_id="CVE-2023-51594" ref_url="https://www.suse.com/security/cve/CVE-2023-51594/" source="CVE"/>
		<reference ref_id="CVE-2023-51596" ref_url="https://www.suse.com/security/cve/CVE-2023-51596/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9413.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9413.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27349/">CVE-2023-27349 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27349">CVE-2023-27349 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44431/">CVE-2023-44431 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44431">CVE-2023-44431 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45866/">CVE-2023-45866 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45866">CVE-2023-45866 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50229/">CVE-2023-50229 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50229">CVE-2023-50229 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50230/">CVE-2023-50230 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50230">CVE-2023-50230 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-51580/">CVE-2023-51580 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51580">CVE-2023-51580 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-51589/">CVE-2023-51589 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51589">CVE-2023-51589 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-51592/">CVE-2023-51592 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51592">CVE-2023-51592 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-51594/">CVE-2023-51594 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51594">CVE-2023-51594 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51596/">CVE-2023-51596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51596">CVE-2023-51596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953756" comment="bluez-5.72-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953757" comment="bluez-cups-5.72-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953758" comment="bluez-libs-5.72-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953759" comment="bluez-libs-devel-5.72-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953760" comment="bluez-obexd-5.72-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4434" version="1" class="patch">
	<metadata>
		<title>security update for python-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-29483" ref_url="https://www.suse.com/security/cve/CVE-2023-29483/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9423.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9423.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29483/">CVE-2023-29483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29483">CVE-2023-29483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953761" comment="python3-dns-2.6.1-3.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4435" version="1" class="patch">
	<metadata>
		<title>security update for tpm2-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-29038" ref_url="https://www.suse.com/security/cve/CVE-2024-29038/" source="CVE"/>
		<reference ref_id="CVE-2024-29039" ref_url="https://www.suse.com/security/cve/CVE-2024-29039/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9424.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9424.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29038/">CVE-2024-29038 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29038">CVE-2024-29038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29039/">CVE-2024-29039 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29039">CVE-2024-29039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953762" comment="tpm2-tools-5.2-4.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4436" version="1" class="patch">
	<metadata>
		<title>security update for nano (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-5742" ref_url="https://www.suse.com/security/cve/CVE-2024-5742/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9430.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9430.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5742/">CVE-2024-5742 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5742">CVE-2024-5742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953763" comment="nano-5.6.1-6.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4437" version="1" class="patch">
	<metadata>
		<title>security update for fontforge (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-25081" ref_url="https://www.suse.com/security/cve/CVE-2024-25081/" source="CVE"/>
		<reference ref_id="CVE-2024-25082" ref_url="https://www.suse.com/security/cve/CVE-2024-25082/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9439.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9439.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25081/">CVE-2024-25081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25081">CVE-2024-25081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25082/">CVE-2024-25082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25082">CVE-2024-25082 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953764" comment="fontforge-20201107-6.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4438" version="1" class="patch">
	<metadata>
		<title>security update for mingw-glib2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34397" ref_url="https://www.suse.com/security/cve/CVE-2024-34397/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9442.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9442.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34397/">CVE-2024-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953765" comment="mingw32-glib2-2.78.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953766" comment="mingw32-glib2-static-2.78.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953767" comment="mingw64-glib2-2.78.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953768" comment="mingw64-glib2-static-2.78.6-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4439" version="1" class="patch">
	<metadata>
		<title>Important: bubblewrap and flatpak security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-42472" ref_url="https://www.suse.com/security/cve/CVE-2024-42472/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9449. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024:9449		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42472/">CVE-2024-42472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42472">CVE-2024-42472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953769" comment="bubblewrap-0.4.1-8.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953770" comment="flatpak-1.12.9-3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953771" comment="flatpak-devel-1.12.9-3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953772" comment="flatpak-libs-1.12.9-3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953773" comment="flatpak-selinux-1.12.9-3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953774" comment="flatpak-session-helper-1.12.9-3.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4440" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9450.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9450.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953775" comment="python3.11-3.11.9-7.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953776" comment="python3.11-debug-3.11.9-7.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953777" comment="python3.11-devel-3.11.9-7.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953778" comment="python3.11-idle-3.11.9-7.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953779" comment="python3.11-libs-3.11.9-7.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953780" comment="python3.11-test-3.11.9-7.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953781" comment="python3.11-tkinter-3.11.9-7.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4441" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9451.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9451.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953782" comment="python3.12-3.12.5-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953783" comment="python3.12-debug-3.12.5-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953784" comment="python3.12-devel-3.12.5-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953785" comment="python3.12-idle-3.12.5-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953786" comment="python3.12-libs-3.12.5-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953787" comment="python3.12-test-3.12.5-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953788" comment="python3.12-tkinter-3.12.5-2.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4442" version="1" class="patch">
	<metadata>
		<title>security update for pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-45769" ref_url="https://www.suse.com/security/cve/CVE-2024-45769/" source="CVE"/>
		<reference ref_id="CVE-2024-45770" ref_url="https://www.suse.com/security/cve/CVE-2024-45770/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9452.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9452.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45769/">CVE-2024-45769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45769">CVE-2024-45769 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45770/">CVE-2024-45770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45770">CVE-2024-45770 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953789" comment="pcp-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953790" comment="pcp-conf-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953791" comment="pcp-devel-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953792" comment="pcp-doc-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953793" comment="pcp-export-pcp2elasticsearch-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953794" comment="pcp-export-pcp2graphite-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953795" comment="pcp-export-pcp2influxdb-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953796" comment="pcp-export-pcp2json-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953797" comment="pcp-export-pcp2openmetrics-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953798" comment="pcp-export-pcp2spark-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953799" comment="pcp-export-pcp2xml-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953800" comment="pcp-export-pcp2zabbix-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953801" comment="pcp-export-zabbix-agent-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953802" comment="pcp-geolocate-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953803" comment="pcp-gui-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953804" comment="pcp-import-collectl2pcp-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953805" comment="pcp-import-ganglia2pcp-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953806" comment="pcp-import-iostat2pcp-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953807" comment="pcp-import-mrtg2pcp-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953808" comment="pcp-import-sar2pcp-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953809" comment="pcp-libs-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953810" comment="pcp-libs-devel-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953811" comment="pcp-pmda-activemq-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953812" comment="pcp-pmda-apache-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953813" comment="pcp-pmda-bash-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953814" comment="pcp-pmda-bcc-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953815" comment="pcp-pmda-bind2-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953816" comment="pcp-pmda-bonding-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953817" comment="pcp-pmda-bpf-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953818" comment="pcp-pmda-bpftrace-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953819" comment="pcp-pmda-cifs-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953820" comment="pcp-pmda-cisco-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953821" comment="pcp-pmda-dbping-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953822" comment="pcp-pmda-denki-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953823" comment="pcp-pmda-dm-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953824" comment="pcp-pmda-docker-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953825" comment="pcp-pmda-ds389-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953826" comment="pcp-pmda-ds389log-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953827" comment="pcp-pmda-elasticsearch-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953828" comment="pcp-pmda-farm-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953829" comment="pcp-pmda-gfs2-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953830" comment="pcp-pmda-gluster-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953831" comment="pcp-pmda-gpfs-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953832" comment="pcp-pmda-gpsd-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953833" comment="pcp-pmda-hacluster-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953834" comment="pcp-pmda-haproxy-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953835" comment="pcp-pmda-infiniband-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953836" comment="pcp-pmda-json-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953837" comment="pcp-pmda-libvirt-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953838" comment="pcp-pmda-lio-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953839" comment="pcp-pmda-lmsensors-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953840" comment="pcp-pmda-logger-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953841" comment="pcp-pmda-lustre-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953842" comment="pcp-pmda-lustrecomm-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953843" comment="pcp-pmda-mailq-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953844" comment="pcp-pmda-memcache-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953845" comment="pcp-pmda-mic-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953846" comment="pcp-pmda-mongodb-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953847" comment="pcp-pmda-mounts-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953848" comment="pcp-pmda-mssql-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953849" comment="pcp-pmda-mysql-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953850" comment="pcp-pmda-named-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953851" comment="pcp-pmda-netcheck-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953852" comment="pcp-pmda-netfilter-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953853" comment="pcp-pmda-news-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953854" comment="pcp-pmda-nfsclient-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953855" comment="pcp-pmda-nginx-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953856" comment="pcp-pmda-nvidia-gpu-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953857" comment="pcp-pmda-openmetrics-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953858" comment="pcp-pmda-openvswitch-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953859" comment="pcp-pmda-oracle-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953860" comment="pcp-pmda-pdns-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953861" comment="pcp-pmda-perfevent-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953862" comment="pcp-pmda-podman-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953863" comment="pcp-pmda-postfix-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953864" comment="pcp-pmda-postgresql-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953865" comment="pcp-pmda-rabbitmq-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953866" comment="pcp-pmda-redis-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953867" comment="pcp-pmda-resctrl-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953868" comment="pcp-pmda-roomtemp-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953869" comment="pcp-pmda-rsyslog-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953870" comment="pcp-pmda-samba-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953871" comment="pcp-pmda-sendmail-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953872" comment="pcp-pmda-shping-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953873" comment="pcp-pmda-slurm-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953874" comment="pcp-pmda-smart-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953875" comment="pcp-pmda-snmp-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953876" comment="pcp-pmda-sockets-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953877" comment="pcp-pmda-statsd-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953878" comment="pcp-pmda-summary-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953879" comment="pcp-pmda-systemd-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953880" comment="pcp-pmda-trace-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953881" comment="pcp-pmda-unbound-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953882" comment="pcp-pmda-uwsgi-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953883" comment="pcp-pmda-weblog-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953884" comment="pcp-pmda-zimbra-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953885" comment="pcp-pmda-zswap-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953886" comment="pcp-selinux-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953887" comment="pcp-system-tools-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953888" comment="pcp-zeroconf-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953889" comment="perl-PCP-LogImport-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953890" comment="perl-PCP-LogSummary-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953891" comment="perl-PCP-MMV-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953892" comment="perl-PCP-PMDA-6.2.2-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953893" comment="python3-pcp-6.2.2-7.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4443" version="1" class="patch">
	<metadata>
		<title>security update for podman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<reference ref_id="CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9454.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9454.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953894" comment="podman-5.2.2-9.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953895" comment="podman-docker-5.2.2-9.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953896" comment="podman-plugins-5.2.2-9.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953897" comment="podman-remote-5.2.2-9.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953898" comment="podman-tests-5.2.2-9.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4444" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-urllib3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9457.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9457.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953899" comment="python3.12-urllib3-1.26.18-2.el9_5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4445" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-urllib3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9458.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9458.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953900" comment="python3.11-urllib3-1.26.12-2.el9_5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4446" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<reference ref_id="CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9459.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9459.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953901" comment="buildah-1.37.5-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953902" comment="buildah-tests-1.37.5-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4447" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9468.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9468.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953903" comment="python-unversioned-command-3.9.19-8.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953904" comment="python3-3.9.19-8.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953905" comment="python3-debug-3.9.19-8.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953906" comment="python3-devel-3.9.19-8.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953907" comment="python3-idle-3.9.19-8.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953908" comment="python3-libs-3.9.19-8.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953909" comment="python3-test-3.9.19-8.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953910" comment="python3-tkinter-3.9.19-8.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4448" version="1" class="patch">
	<metadata>
		<title>security update for cups (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-47175" ref_url="https://www.suse.com/security/cve/CVE-2024-47175/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9470.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9470.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47175/">CVE-2024-47175 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47175">CVE-2024-47175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953911" comment="cups-2.3.3op2-31.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953912" comment="cups-client-2.3.3op2-31.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953913" comment="cups-devel-2.3.3op2-31.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953914" comment="cups-filesystem-2.3.3op2-31.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953915" comment="cups-ipptool-2.3.3op2-31.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953916" comment="cups-libs-2.3.3op2-31.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953917" comment="cups-lpd-2.3.3op2-31.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953918" comment="cups-printerapp-2.3.3op2-31.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4449" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9472.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9472.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953919" comment="grafana-pcp-5.1.1-9.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4450" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-47875" ref_url="https://www.suse.com/security/cve/CVE-2024-47875/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9473.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9473.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47875/">CVE-2024-47875 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47875">CVE-2024-47875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953920" comment="grafana-10.2.6-7.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953921" comment="grafana-selinux-10.2.6-7.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4451" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-3596" ref_url="https://www.suse.com/security/cve/CVE-2024-3596/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9474.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9474.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3596/">CVE-2024-3596 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3596">CVE-2024-3596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953922" comment="krb5-devel-1.21.1-4.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953923" comment="krb5-libs-1.21.1-4.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953924" comment="krb5-pkinit-1.21.1-4.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953925" comment="krb5-server-1.21.1-4.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953926" comment="krb5-server-ldap-1.21.1-4.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953927" comment="krb5-workstation-1.21.1-4.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953928" comment="libkadm5-1.21.1-4.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4452" version="1" class="patch">
	<metadata>
		<title>security update for expat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9541.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9541.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953929" comment="expat-2.5.0-3.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953930" comment="expat-devel-2.5.0-3.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4453" version="1" class="patch">
	<metadata>
		<title>security update for dotnet9.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-43498" ref_url="https://www.suse.com/security/cve/CVE-2024-43498/" source="CVE"/>
		<reference ref_id="CVE-2024-43499" ref_url="https://www.suse.com/security/cve/CVE-2024-43499/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9543.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9543.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43498/">CVE-2024-43498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43498">CVE-2024-43498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43499/">CVE-2024-43499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43499">CVE-2024-43499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954005" comment="aspnetcore-runtime-9.0-9.0.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954006" comment="aspnetcore-runtime-dbg-9.0-9.0.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954007" comment="aspnetcore-targeting-pack-9.0-9.0.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954008" comment="dotnet-apphost-pack-9.0-9.0.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954009" comment="dotnet-host-9.0.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954010" comment="dotnet-hostfxr-9.0-9.0.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954011" comment="dotnet-runtime-9.0-9.0.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954012" comment="dotnet-runtime-dbg-9.0-9.0.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954013" comment="dotnet-sdk-9.0-9.0.100-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954014" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954015" comment="dotnet-sdk-aot-9.0-9.0.100-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954016" comment="dotnet-sdk-dbg-9.0-9.0.100-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954017" comment="dotnet-targeting-pack-9.0-9.0.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954018" comment="dotnet-templates-9.0-9.0.100-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954019" comment="netstandard-targeting-pack-2.1-9.0.100-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4454" version="1" class="patch">
	<metadata>
		<title>security update for openexr (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-5841" ref_url="https://www.suse.com/security/cve/CVE-2023-5841/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9548.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9548.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-5841/">CVE-2023-5841 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5841">CVE-2023-5841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953931" comment="openexr-3.1.1-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953932" comment="openexr-devel-3.1.1-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953933" comment="openexr-libs-3.1.1-2.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4455" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9552.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9552.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953934" comment="thunderbird-128.4.0-1.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4456" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-27856" ref_url="https://www.suse.com/security/cve/CVE-2024-27856/" source="CVE"/>
		<reference ref_id="CVE-2024-40866" ref_url="https://www.suse.com/security/cve/CVE-2024-40866/" source="CVE"/>
		<reference ref_id="CVE-2024-44185" ref_url="https://www.suse.com/security/cve/CVE-2024-44185/" source="CVE"/>
		<reference ref_id="CVE-2024-44187" ref_url="https://www.suse.com/security/cve/CVE-2024-44187/" source="CVE"/>
		<reference ref_id="CVE-2024-44244" ref_url="https://www.suse.com/security/cve/CVE-2024-44244/" source="CVE"/>
		<reference ref_id="CVE-2024-54534" ref_url="https://www.suse.com/security/cve/CVE-2024-54534/" source="CVE"/>
		<reference ref_id="CVE-2025-43480" ref_url="https://www.suse.com/security/cve/CVE-2025-43480/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9553.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9553.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-27856/">CVE-2024-27856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27856">CVE-2024-27856 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-40866/">CVE-2024-40866 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40866">CVE-2024-40866 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44185/">CVE-2024-44185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44185">CVE-2024-44185 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-44187/">CVE-2024-44187 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44187">CVE-2024-44187 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44244/">CVE-2024-44244 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44244">CVE-2024-44244 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54534/">CVE-2024-54534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54534">CVE-2024-54534 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43480/">CVE-2025-43480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43480">CVE-2025-43480 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953935" comment="webkit2gtk3-2.46.3-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953936" comment="webkit2gtk3-devel-2.46.3-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953937" comment="webkit2gtk3-jsc-2.46.3-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953938" comment="webkit2gtk3-jsc-devel-2.46.3-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4457" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9554.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9554.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953939" comment="firefox-128.4.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953940" comment="firefox-x11-128.4.0-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4458" version="1" class="patch">
	<metadata>
		<title>security update for NetworkManager-libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-9050" ref_url="https://www.suse.com/security/cve/CVE-2024-9050/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9555.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9555.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9050/">CVE-2024-9050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9050">CVE-2024-9050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953941" comment="NetworkManager-libreswan-1.2.22-4.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953942" comment="NetworkManager-libreswan-gnome-1.2.22-4.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4459" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-52530" ref_url="https://www.suse.com/security/cve/CVE-2024-52530/" source="CVE"/>
		<reference ref_id="CVE-2024-52532" ref_url="https://www.suse.com/security/cve/CVE-2024-52532/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9559.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9559.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52530/">CVE-2024-52530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52530">CVE-2024-52530 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52532/">CVE-2024-52532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52532">CVE-2024-52532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953943" comment="libsoup-2.72.0-8.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953944" comment="libsoup-devel-2.72.0-8.el9_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4460" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-42283" ref_url="https://www.suse.com/security/cve/CVE-2024-42283/" source="CVE"/>
		<reference ref_id="CVE-2024-46824" ref_url="https://www.suse.com/security/cve/CVE-2024-46824/" source="CVE"/>
		<reference ref_id="CVE-2024-46858" ref_url="https://www.suse.com/security/cve/CVE-2024-46858/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9605.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9605.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42283/">CVE-2024-42283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42283">CVE-2024-42283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46824/">CVE-2024-46824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46824">CVE-2024-46824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46858/">CVE-2024-46858 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46858">CVE-2024-46858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953945" comment="bpftool-7.4.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953946" comment="kernel-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953947" comment="kernel-abi-stablelists-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953948" comment="kernel-core-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953949" comment="kernel-cross-headers-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953950" comment="kernel-debug-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953951" comment="kernel-debug-core-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953954" comment="kernel-debug-modules-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953955" comment="kernel-debug-modules-core-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953956" comment="kernel-debug-modules-extra-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953957" comment="kernel-debug-uki-virt-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953960" comment="kernel-doc-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953961" comment="kernel-headers-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953962" comment="kernel-modules-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953963" comment="kernel-modules-core-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953964" comment="kernel-modules-extra-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953965" comment="kernel-tools-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953966" comment="kernel-tools-libs-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953968" comment="kernel-uki-virt-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953969" comment="kernel-uki-virt-addons-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953970" comment="libperf-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953971" comment="perf-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953972" comment="python3-perf-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953973" comment="rtla-5.14.0-503.14.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953974" comment="rv-5.14.0-503.14.1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4461" version="1" class="patch">
	<metadata>
		<title>security update for squid (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-45802" ref_url="https://www.suse.com/security/cve/CVE-2024-45802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9625.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9625.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-45802/">CVE-2024-45802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45802">CVE-2024-45802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953975" comment="squid-5.5-14.el9_5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4462" version="1" class="patch">
	<metadata>
		<title>security update for libvpx (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-5197" ref_url="https://www.suse.com/security/cve/CVE-2024-5197/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9827.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9827.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5197/">CVE-2024-5197 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5197">CVE-2024-5197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953976" comment="libvpx-1.9.0-8.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953977" comment="libvpx-devel-1.9.0-8.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4463" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-46713" ref_url="https://www.suse.com/security/cve/CVE-2024-46713/" source="CVE"/>
		<reference ref_id="CVE-2024-50208" ref_url="https://www.suse.com/security/cve/CVE-2024-50208/" source="CVE"/>
		<reference ref_id="CVE-2024-50252" ref_url="https://www.suse.com/security/cve/CVE-2024-50252/" source="CVE"/>
		<reference ref_id="CVE-2024-53122" ref_url="https://www.suse.com/security/cve/CVE-2024-53122/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0059.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0059.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46713/">CVE-2024-46713 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46713">CVE-2024-46713 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50208/">CVE-2024-50208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50252/">CVE-2024-50252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50252">CVE-2024-50252 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53122/">CVE-2024-53122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53122">CVE-2024-53122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959322" comment="bpftool-7.4.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959323" comment="kernel-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959324" comment="kernel-abi-stablelists-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959325" comment="kernel-core-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959326" comment="kernel-cross-headers-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959327" comment="kernel-debug-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959328" comment="kernel-debug-core-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959331" comment="kernel-debug-modules-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959332" comment="kernel-debug-modules-core-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959333" comment="kernel-debug-modules-extra-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959334" comment="kernel-debug-uki-virt-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959337" comment="kernel-doc-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959338" comment="kernel-headers-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959339" comment="kernel-modules-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959340" comment="kernel-modules-core-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959341" comment="kernel-modules-extra-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959342" comment="kernel-tools-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959343" comment="kernel-tools-libs-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959345" comment="kernel-uki-virt-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959346" comment="kernel-uki-virt-addons-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959347" comment="libperf-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959348" comment="perf-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959349" comment="python3-perf-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959350" comment="rtla-5.14.0-503.21.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959351" comment="rv-5.14.0-503.21.1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4464" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-0237" ref_url="https://www.suse.com/security/cve/CVE-2025-0237/" source="CVE"/>
		<reference ref_id="CVE-2025-0238" ref_url="https://www.suse.com/security/cve/CVE-2025-0238/" source="CVE"/>
		<reference ref_id="CVE-2025-0239" ref_url="https://www.suse.com/security/cve/CVE-2025-0239/" source="CVE"/>
		<reference ref_id="CVE-2025-0240" ref_url="https://www.suse.com/security/cve/CVE-2025-0240/" source="CVE"/>
		<reference ref_id="CVE-2025-0241" ref_url="https://www.suse.com/security/cve/CVE-2025-0241/" source="CVE"/>
		<reference ref_id="CVE-2025-0242" ref_url="https://www.suse.com/security/cve/CVE-2025-0242/" source="CVE"/>
		<reference ref_id="CVE-2025-0243" ref_url="https://www.suse.com/security/cve/CVE-2025-0243/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0080.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0080.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0237/">CVE-2025-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0237">CVE-2025-0237 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0238/">CVE-2025-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0238">CVE-2025-0238 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0239/">CVE-2025-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0239">CVE-2025-0239 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0240/">CVE-2025-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0240">CVE-2025-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0241/">CVE-2025-0241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0241">CVE-2025-0241 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0242/">CVE-2025-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0242">CVE-2025-0242 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0243/">CVE-2025-0243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0243">CVE-2025-0243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960005" comment="firefox-128.6.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960006" comment="firefox-x11-128.6.0-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4465" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-54479" ref_url="https://www.suse.com/security/cve/CVE-2024-54479/" source="CVE"/>
		<reference ref_id="CVE-2024-54502" ref_url="https://www.suse.com/security/cve/CVE-2024-54502/" source="CVE"/>
		<reference ref_id="CVE-2024-54505" ref_url="https://www.suse.com/security/cve/CVE-2024-54505/" source="CVE"/>
		<reference ref_id="CVE-2024-54508" ref_url="https://www.suse.com/security/cve/CVE-2024-54508/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0146.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0146.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54479/">CVE-2024-54479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54479">CVE-2024-54479 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54502/">CVE-2024-54502 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54502">CVE-2024-54502 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54505/">CVE-2024-54505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54505">CVE-2024-54505 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54508/">CVE-2024-54508 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54508">CVE-2024-54508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959720" comment="webkit2gtk3-2.46.5-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959721" comment="webkit2gtk3-devel-2.46.5-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959722" comment="webkit2gtk3-jsc-2.46.5-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959723" comment="webkit2gtk3-jsc-devel-2.46.5-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4466" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-0237" ref_url="https://www.suse.com/security/cve/CVE-2025-0237/" source="CVE"/>
		<reference ref_id="CVE-2025-0238" ref_url="https://www.suse.com/security/cve/CVE-2025-0238/" source="CVE"/>
		<reference ref_id="CVE-2025-0239" ref_url="https://www.suse.com/security/cve/CVE-2025-0239/" source="CVE"/>
		<reference ref_id="CVE-2025-0240" ref_url="https://www.suse.com/security/cve/CVE-2025-0240/" source="CVE"/>
		<reference ref_id="CVE-2025-0241" ref_url="https://www.suse.com/security/cve/CVE-2025-0241/" source="CVE"/>
		<reference ref_id="CVE-2025-0242" ref_url="https://www.suse.com/security/cve/CVE-2025-0242/" source="CVE"/>
		<reference ref_id="CVE-2025-0243" ref_url="https://www.suse.com/security/cve/CVE-2025-0243/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0147.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0147.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0237/">CVE-2025-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0237">CVE-2025-0237 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0238/">CVE-2025-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0238">CVE-2025-0238 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0239/">CVE-2025-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0239">CVE-2025-0239 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0240/">CVE-2025-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0240">CVE-2025-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0241/">CVE-2025-0241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0241">CVE-2025-0241 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0242/">CVE-2025-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0242">CVE-2025-0242 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0243/">CVE-2025-0243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0243">CVE-2025-0243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960007" comment="thunderbird-128.6.0-3.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4467" version="1" class="patch">
	<metadata>
		<title>security update for iperf3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-53580" ref_url="https://www.suse.com/security/cve/CVE-2024-53580/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0161.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0161.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53580/">CVE-2024-53580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53580">CVE-2024-53580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959724" comment="iperf3-3.9-13.el9_5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4468" version="1" class="patch">
	<metadata>
		<title>security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-11614" ref_url="https://www.suse.com/security/cve/CVE-2024-11614/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0210.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0210.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11614/">CVE-2024-11614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11614">CVE-2024-11614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959725" comment="dpdk-23.11-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959726" comment="dpdk-devel-23.11-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959727" comment="dpdk-doc-23.11-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959728" comment="dpdk-tools-23.11-2.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4469" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-56201" ref_url="https://www.suse.com/security/cve/CVE-2024-56201/" source="CVE"/>
		<reference ref_id="CVE-2024-56326" ref_url="https://www.suse.com/security/cve/CVE-2024-56326/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0308.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0308.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56201/">CVE-2024-56201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56201">CVE-2024-56201 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56326/">CVE-2024-56326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56326">CVE-2024-56326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960124" comment="fence-agents-aliyun-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960125" comment="fence-agents-all-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960126" comment="fence-agents-amt-ws-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960127" comment="fence-agents-apc-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960128" comment="fence-agents-apc-snmp-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960129" comment="fence-agents-aws-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960130" comment="fence-agents-azure-arm-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960131" comment="fence-agents-bladecenter-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960132" comment="fence-agents-brocade-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960133" comment="fence-agents-cisco-mds-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960134" comment="fence-agents-cisco-ucs-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960135" comment="fence-agents-common-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960136" comment="fence-agents-compute-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960137" comment="fence-agents-drac5-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960138" comment="fence-agents-eaton-snmp-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960139" comment="fence-agents-emerson-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960140" comment="fence-agents-eps-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960141" comment="fence-agents-gce-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960142" comment="fence-agents-heuristics-ping-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960143" comment="fence-agents-hpblade-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960144" comment="fence-agents-ibm-powervs-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960145" comment="fence-agents-ibm-vpc-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960146" comment="fence-agents-ibmblade-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960147" comment="fence-agents-ifmib-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960148" comment="fence-agents-ilo-moonshot-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960149" comment="fence-agents-ilo-mp-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960150" comment="fence-agents-ilo-ssh-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960151" comment="fence-agents-ilo2-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960152" comment="fence-agents-intelmodular-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960153" comment="fence-agents-ipdu-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960154" comment="fence-agents-ipmilan-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960155" comment="fence-agents-kdump-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960156" comment="fence-agents-kubevirt-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960157" comment="fence-agents-mpath-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960158" comment="fence-agents-openstack-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960159" comment="fence-agents-redfish-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960160" comment="fence-agents-rhevm-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960161" comment="fence-agents-rsa-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960162" comment="fence-agents-rsb-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960163" comment="fence-agents-sbd-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960164" comment="fence-agents-scsi-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960165" comment="fence-agents-virsh-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960166" comment="fence-agents-vmware-rest-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960167" comment="fence-agents-vmware-soap-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960168" comment="fence-agents-wti-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960169" comment="fence-virt-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960170" comment="fence-virtd-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960171" comment="fence-virtd-cpg-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960172" comment="fence-virtd-libvirt-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960173" comment="fence-virtd-multicast-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960174" comment="fence-virtd-serial-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960175" comment="fence-virtd-tcp-4.10.0-76.el9_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960176" comment="ha-cloud-support-4.10.0-76.el9_5.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4470" version="1" class="patch">
	<metadata>
		<title>security update for raptor2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-57823" ref_url="https://www.suse.com/security/cve/CVE-2024-57823/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0312.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0312.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57823/">CVE-2024-57823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57823">CVE-2024-57823 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960344" comment="raptor2-2.0.15-32.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960345" comment="raptor2-devel-2.0.15-32.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4471" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-12085" ref_url="https://www.suse.com/security/cve/CVE-2024-12085/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0324.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0324.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12085/">CVE-2024-12085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12085">CVE-2024-12085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960346" comment="rsync-3.2.3-20.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960347" comment="rsync-daemon-3.2.3-20.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4472" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-11029" ref_url="https://www.suse.com/security/cve/CVE-2024-11029/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0334.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0334.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11029/">CVE-2024-11029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11029">CVE-2024-11029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961436" comment="ipa-client-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961437" comment="ipa-client-common-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961438" comment="ipa-client-epn-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961439" comment="ipa-client-samba-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961440" comment="ipa-common-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961441" comment="ipa-selinux-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961442" comment="ipa-selinux-luna-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961443" comment="ipa-selinux-nfast-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961444" comment="ipa-server-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961445" comment="ipa-server-common-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961446" comment="ipa-server-dns-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961447" comment="ipa-server-trust-ad-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961448" comment="python3-ipaclient-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961449" comment="python3-ipalib-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961450" comment="python3-ipaserver-4.12.2-1.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960791" comment="python3-ipatests-4.12.2-1.el9_5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4473" version="1" class="patch">
	<metadata>
		<title>security update for NetworkManager (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-3661" ref_url="https://www.suse.com/security/cve/CVE-2024-3661/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0377.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0377.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-3661/">CVE-2024-3661 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3661">CVE-2024-3661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960792" comment="NetworkManager-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960793" comment="NetworkManager-adsl-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960794" comment="NetworkManager-bluetooth-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960795" comment="NetworkManager-cloud-setup-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960796" comment="NetworkManager-config-connectivity-suse-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960797" comment="NetworkManager-config-server-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960798" comment="NetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960799" comment="NetworkManager-initscripts-updown-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960800" comment="NetworkManager-libnm-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960801" comment="NetworkManager-libnm-devel-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960802" comment="NetworkManager-ovs-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960803" comment="NetworkManager-ppp-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960804" comment="NetworkManager-team-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960805" comment="NetworkManager-tui-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960806" comment="NetworkManager-wifi-1.48.10-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960807" comment="NetworkManager-wwan-1.48.10-5.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4474" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0422.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0422.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961355" comment="java-17-openjdk-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961356" comment="java-17-openjdk-demo-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961357" comment="java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961358" comment="java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961359" comment="java-17-openjdk-devel-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961360" comment="java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961361" comment="java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961362" comment="java-17-openjdk-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961363" comment="java-17-openjdk-headless-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961364" comment="java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961365" comment="java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961366" comment="java-17-openjdk-javadoc-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961367" comment="java-17-openjdk-javadoc-zip-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961368" comment="java-17-openjdk-jmods-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961369" comment="java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961370" comment="java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961371" comment="java-17-openjdk-slowdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961372" comment="java-17-openjdk-src-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961373" comment="java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961374" comment="java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961375" comment="java-17-openjdk-static-libs-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961376" comment="java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961377" comment="java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4475" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0426.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0426.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961378" comment="java-21-openjdk-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961379" comment="java-21-openjdk-demo-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961380" comment="java-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961381" comment="java-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961382" comment="java-21-openjdk-devel-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961383" comment="java-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961384" comment="java-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961385" comment="java-21-openjdk-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961386" comment="java-21-openjdk-headless-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961387" comment="java-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961388" comment="java-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961389" comment="java-21-openjdk-javadoc-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961390" comment="java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961391" comment="java-21-openjdk-jmods-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961392" comment="java-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961393" comment="java-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961394" comment="java-21-openjdk-slowdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961395" comment="java-21-openjdk-src-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961396" comment="java-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961397" comment="java-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961398" comment="java-21-openjdk-static-libs-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961399" comment="java-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961400" comment="java-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4476" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154/" source="CVE"/>
		<reference ref_id="CVE-2024-50275" ref_url="https://www.suse.com/security/cve/CVE-2024-50275/" source="CVE"/>
		<reference ref_id="CVE-2024-53088" ref_url="https://www.suse.com/security/cve/CVE-2024-53088/" source="CVE"/>
		<reference ref_id="CVE-2024-57947" ref_url="https://www.suse.com/security/cve/CVE-2024-57947/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0578.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0578.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50275/">CVE-2024-50275 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50275">CVE-2024-50275 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53088/">CVE-2024-53088 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53088">CVE-2024-53088 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57947/">CVE-2024-57947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57947">CVE-2024-57947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961451" comment="bpftool-7.4.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961452" comment="kernel-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961453" comment="kernel-abi-stablelists-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961454" comment="kernel-core-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961455" comment="kernel-cross-headers-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961456" comment="kernel-debug-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961457" comment="kernel-debug-core-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961460" comment="kernel-debug-modules-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961461" comment="kernel-debug-modules-core-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961462" comment="kernel-debug-modules-extra-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961463" comment="kernel-debug-uki-virt-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961466" comment="kernel-doc-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961467" comment="kernel-headers-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961468" comment="kernel-modules-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961469" comment="kernel-modules-core-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961470" comment="kernel-modules-extra-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961471" comment="kernel-tools-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961472" comment="kernel-tools-libs-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961474" comment="kernel-uki-virt-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961475" comment="kernel-uki-virt-addons-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961476" comment="libperf-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961477" comment="perf-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961478" comment="python3-perf-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961479" comment="rtla-5.14.0-503.22.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961480" comment="rv-5.14.0-503.22.1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4477" version="1" class="patch">
	<metadata>
		<title>security update for python-jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-56326" ref_url="https://www.suse.com/security/cve/CVE-2024-56326/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0667.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0667.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56326/">CVE-2024-56326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56326">CVE-2024-56326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961481" comment="python3-jinja2-2.11.3-7.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4478" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-53263" ref_url="https://www.suse.com/security/cve/CVE-2024-53263/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0673.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0673.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53263/">CVE-2024-53263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53263">CVE-2024-53263 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961482" comment="git-lfs-3.4.1-4.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4479" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-46981" ref_url="https://www.suse.com/security/cve/CVE-2024-46981/" source="CVE"/>
		<reference ref_id="CVE-2024-51741" ref_url="https://www.suse.com/security/cve/CVE-2024-51741/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0692.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0692.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46981/">CVE-2024-46981 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46981">CVE-2024-46981 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51741/">CVE-2024-51741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51741">CVE-2024-51741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961483" comment="redis-7.2.7-1.module+el9.5.0+22705+3d861c1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961484" comment="redis-devel-7.2.7-1.module+el9.5.0+22705+3d861c1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961485" comment="redis-doc-7.2.7-1.module+el9.5.0+22705+3d861c1c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4480" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-24834" ref_url="https://www.suse.com/security/cve/CVE-2022-24834/" source="CVE"/>
		<reference ref_id="CVE-2023-45145" ref_url="https://www.suse.com/security/cve/CVE-2023-45145/" source="CVE"/>
		<reference ref_id="CVE-2024-31228" ref_url="https://www.suse.com/security/cve/CVE-2024-31228/" source="CVE"/>
		<reference ref_id="CVE-2024-31449" ref_url="https://www.suse.com/security/cve/CVE-2024-31449/" source="CVE"/>
		<reference ref_id="CVE-2024-46981" ref_url="https://www.suse.com/security/cve/CVE-2024-46981/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0693.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0693.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24834/">CVE-2022-24834 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24834">CVE-2022-24834 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45145/">CVE-2023-45145 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45145">CVE-2023-45145 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31228/">CVE-2024-31228 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31228">CVE-2024-31228 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31449/">CVE-2024-31449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31449">CVE-2024-31449 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46981/">CVE-2024-46981 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46981">CVE-2024-46981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961486" comment="redis-6.2.17-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961487" comment="redis-devel-6.2.17-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961488" comment="redis-doc-6.2.17-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4481" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-52531" ref_url="https://www.suse.com/security/cve/CVE-2024-52531/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0791.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0791.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52531/">CVE-2024-52531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52531">CVE-2024-52531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962061" comment="libsoup-2.72.0-8.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962062" comment="libsoup-devel-2.72.0-8.el9_5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4482" version="1" class="patch">
	<metadata>
		<title>security update for galera (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-21096" ref_url="https://www.suse.com/security/cve/CVE-2024-21096/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0912.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0912.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-21096/">CVE-2024-21096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21096">CVE-2024-21096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962391" comment="galera-26.4.20-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962392" comment="mariadb-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962393" comment="mariadb-backup-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962394" comment="mariadb-common-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962395" comment="mariadb-devel-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962396" comment="mariadb-embedded-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962397" comment="mariadb-embedded-devel-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962398" comment="mariadb-errmsg-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962399" comment="mariadb-gssapi-server-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962400" comment="mariadb-oqgraph-engine-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962401" comment="mariadb-pam-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962402" comment="mariadb-server-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962403" comment="mariadb-server-galera-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962404" comment="mariadb-server-utils-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962405" comment="mariadb-test-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4483" version="1" class="patch">
	<metadata>
		<title>security update for galera (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-22084" ref_url="https://www.suse.com/security/cve/CVE-2023-22084/" source="CVE"/>
		<reference ref_id="CVE-2024-21096" ref_url="https://www.suse.com/security/cve/CVE-2024-21096/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0914.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0914.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22084/">CVE-2023-22084 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22084">CVE-2023-22084 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-21096/">CVE-2024-21096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21096">CVE-2024-21096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962406" comment="galera-26.4.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962407" comment="mariadb-10.5.27-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962408" comment="mariadb-backup-10.5.27-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962409" comment="mariadb-common-10.5.27-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962410" comment="mariadb-devel-10.5.27-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962411" comment="mariadb-embedded-10.5.27-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962412" comment="mariadb-embedded-devel-10.5.27-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962413" comment="mariadb-errmsg-10.5.27-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962414" comment="mariadb-gssapi-server-10.5.27-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962415" comment="mariadb-oqgraph-engine-10.5.27-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962416" comment="mariadb-pam-10.5.27-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962417" comment="mariadb-server-10.5.27-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962418" comment="mariadb-server-galera-10.5.27-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962419" comment="mariadb-server-utils-10.5.27-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962420" comment="mariadb-test-10.5.27-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4484" version="1" class="patch">
	<metadata>
		<title>security update for keepalived (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-41184" ref_url="https://www.suse.com/security/cve/CVE-2024-41184/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0917.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0917.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-41184/">CVE-2024-41184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41184">CVE-2024-41184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962421" comment="keepalived-2.2.8-4.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4485" version="1" class="patch">
	<metadata>
		<title>security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-11218" ref_url="https://www.suse.com/security/cve/CVE-2024-11218/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0922.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0922.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-11218/">CVE-2024-11218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11218">CVE-2024-11218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962422" comment="podman-5.2.2-13.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962423" comment="podman-docker-5.2.2-13.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962424" comment="podman-plugins-5.2.2-13.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962425" comment="podman-remote-5.2.2-13.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962426" comment="podman-tests-5.2.2-13.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4486" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-11218" ref_url="https://www.suse.com/security/cve/CVE-2024-11218/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0923.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0923.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-11218/">CVE-2024-11218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11218">CVE-2024-11218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962427" comment="buildah-1.37.6-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962428" comment="buildah-tests-1.37.6-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4487" version="1" class="patch">
	<metadata>
		<title>security update for bzip2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0925.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0925.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962429" comment="bzip2-1.0.8-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962430" comment="bzip2-devel-1.0.8-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962431" comment="bzip2-libs-1.0.8-10.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4488" version="1" class="patch">
	<metadata>
		<title>security update for mingw-glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-52533" ref_url="https://www.suse.com/security/cve/CVE-2024-52533/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0936.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0936.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52533/">CVE-2024-52533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52533">CVE-2024-52533 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962432" comment="mingw32-glib2-2.78.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962433" comment="mingw32-glib2-static-2.78.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962434" comment="mingw64-glib2-2.78.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962435" comment="mingw64-glib2-static-2.78.6-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4489" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-6424" ref_url="https://www.suse.com/security/cve/CVE-2025-6424/" source="CVE"/>
		<reference ref_id="CVE-2025-6425" ref_url="https://www.suse.com/security/cve/CVE-2025-6425/" source="CVE"/>
		<reference ref_id="CVE-2025-6429" ref_url="https://www.suse.com/security/cve/CVE-2025-6429/" source="CVE"/>
		<reference ref_id="CVE-2025-6430" ref_url="https://www.suse.com/security/cve/CVE-2025-6430/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10072.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10072.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6424/">CVE-2025-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6424">CVE-2025-6424 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6425/">CVE-2025-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6425">CVE-2025-6425 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6429/">CVE-2025-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6429">CVE-2025-6429 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6430/">CVE-2025-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6430">CVE-2025-6430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998055" comment="firefox-128.12.0-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998056" comment="firefox-x11-128.12.0-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4490" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718/" source="CVE"/>
		<reference ref_id="CVE-2025-4138" ref_url="https://www.suse.com/security/cve/CVE-2025-4138/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4435" ref_url="https://www.suse.com/security/cve/CVE-2025-4435/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10136.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10136.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-4138/">CVE-2025-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4138">CVE-2025-4138 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4435/">CVE-2025-4435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4435">CVE-2025-4435 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998057" comment="python-unversioned-command-3.9.21-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998058" comment="python3-3.9.21-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998059" comment="python3-debug-3.9.21-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998060" comment="python3-devel-3.9.21-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998061" comment="python3-idle-3.9.21-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998062" comment="python3-libs-3.9.21-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998063" comment="python3-test-3.9.21-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998064" comment="python3-tkinter-3.9.21-2.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4491" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718/" source="CVE"/>
		<reference ref_id="CVE-2025-4138" ref_url="https://www.suse.com/security/cve/CVE-2025-4138/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4435" ref_url="https://www.suse.com/security/cve/CVE-2025-4435/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10148.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10148.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-4138/">CVE-2025-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4138">CVE-2025-4138 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4435/">CVE-2025-4435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4435">CVE-2025-4435 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998168" comment="python3.11-3.11.11-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998169" comment="python3.11-debug-3.11.11-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998170" comment="python3.11-devel-3.11.11-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998171" comment="python3.11-idle-3.11.11-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998172" comment="python3.11-libs-3.11.11-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998173" comment="python3.11-test-3.11.11-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998174" comment="python3.11-tkinter-3.11.11-2.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4492" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718/" source="CVE"/>
		<reference ref_id="CVE-2025-4138" ref_url="https://www.suse.com/security/cve/CVE-2025-4138/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4435" ref_url="https://www.suse.com/security/cve/CVE-2025-4435/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10189.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10189.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-4138/">CVE-2025-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4138">CVE-2025-4138 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4435/">CVE-2025-4435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4435">CVE-2025-4435 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998065" comment="python3.12-3.12.9-1.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998066" comment="python3.12-debug-3.12.9-1.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998067" comment="python3.12-devel-3.12.9-1.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998068" comment="python3.12-idle-3.12.9-1.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998069" comment="python3.12-libs-3.12.9-1.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998070" comment="python3.12-test-3.12.9-1.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998071" comment="python3.12-tkinter-3.12.9-1.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4493" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-5986" ref_url="https://www.suse.com/security/cve/CVE-2025-5986/" source="CVE"/>
		<reference ref_id="CVE-2025-6424" ref_url="https://www.suse.com/security/cve/CVE-2025-6424/" source="CVE"/>
		<reference ref_id="CVE-2025-6425" ref_url="https://www.suse.com/security/cve/CVE-2025-6425/" source="CVE"/>
		<reference ref_id="CVE-2025-6429" ref_url="https://www.suse.com/security/cve/CVE-2025-6429/" source="CVE"/>
		<reference ref_id="CVE-2025-6430" ref_url="https://www.suse.com/security/cve/CVE-2025-6430/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10196.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10196.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-5986/">CVE-2025-5986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5986">CVE-2025-5986 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6424/">CVE-2025-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6424">CVE-2025-6424 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6425/">CVE-2025-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6425">CVE-2025-6425 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6429/">CVE-2025-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6429">CVE-2025-6429 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6430/">CVE-2025-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6430">CVE-2025-6430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998072" comment="thunderbird-128.12.0-1.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4494" version="1" class="patch">
	<metadata>
		<title>security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-54661" ref_url="https://www.suse.com/security/cve/CVE-2024-54661/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10353.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10353.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-54661/">CVE-2024-54661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54661">CVE-2024-54661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999182" comment="socat-1.7.4.1-6.el9_6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4495" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-49846" ref_url="https://www.suse.com/security/cve/CVE-2022-49846/" source="CVE"/>
		<reference ref_id="CVE-2025-21759" ref_url="https://www.suse.com/security/cve/CVE-2025-21759/" source="CVE"/>
		<reference ref_id="CVE-2025-21887" ref_url="https://www.suse.com/security/cve/CVE-2025-21887/" source="CVE"/>
		<reference ref_id="CVE-2025-22004" ref_url="https://www.suse.com/security/cve/CVE-2025-22004/" source="CVE"/>
		<reference ref_id="CVE-2025-37799" ref_url="https://www.suse.com/security/cve/CVE-2025-37799/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10379.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10379.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49846/">CVE-2022-49846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49846">CVE-2022-49846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21759/">CVE-2025-21759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21759">CVE-2025-21759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21887/">CVE-2025-21887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21887">CVE-2025-21887 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22004/">CVE-2025-22004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37799/">CVE-2025-37799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37799">CVE-2025-37799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999183" comment="kernel-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999184" comment="kernel-abi-stablelists-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999185" comment="kernel-core-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999186" comment="kernel-cross-headers-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999187" comment="kernel-debug-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999188" comment="kernel-debug-core-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999191" comment="kernel-debug-modules-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999192" comment="kernel-debug-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999193" comment="kernel-debug-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999194" comment="kernel-debug-uki-virt-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999197" comment="kernel-doc-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999198" comment="kernel-headers-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999199" comment="kernel-modules-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999200" comment="kernel-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999201" comment="kernel-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999202" comment="kernel-rt-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999203" comment="kernel-rt-core-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999204" comment="kernel-rt-debug-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999205" comment="kernel-rt-debug-core-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999207" comment="kernel-rt-debug-kvm-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999208" comment="kernel-rt-debug-modules-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999209" comment="kernel-rt-debug-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999210" comment="kernel-rt-debug-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999212" comment="kernel-rt-kvm-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999213" comment="kernel-rt-modules-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999214" comment="kernel-rt-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999215" comment="kernel-rt-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999216" comment="kernel-tools-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999217" comment="kernel-tools-libs-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999219" comment="kernel-uki-virt-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999220" comment="kernel-uki-virt-addons-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999221" comment="libperf-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999222" comment="perf-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999223" comment="python3-perf-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999224" comment="rtla-5.14.0-570.25.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999225" comment="rv-5.14.0-570.25.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4496" version="1" class="patch">
	<metadata>
		<title>security update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10407.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10407.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999226" comment="python3-setuptools-53.0.0-13.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999227" comment="python3-setuptools-wheel-53.0.0-13.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4497" version="1" class="patch">
	<metadata>
		<title>security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-6032" ref_url="https://www.suse.com/security/cve/CVE-2025-6032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10550.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10550.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6032/">CVE-2025-6032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6032">CVE-2025-6032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999418" comment="podman-5.4.0-12.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999419" comment="podman-docker-5.4.0-12.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999420" comment="podman-plugins-5.4.0-12.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999421" comment="podman-remote-5.4.0-12.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999422" comment="podman-tests-5.4.0-12.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4498" version="1" class="patch">
	<metadata>
		<title>security update for jq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-23337" ref_url="https://www.suse.com/security/cve/CVE-2024-23337/" source="CVE"/>
		<reference ref_id="CVE-2025-48060" ref_url="https://www.suse.com/security/cve/CVE-2025-48060/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10585.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10585.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23337/">CVE-2024-23337 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23337">CVE-2024-23337 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48060/">CVE-2025-48060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48060">CVE-2025-48060 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999228" comment="jq-1.6-17.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999229" comment="jq-devel-1.6-17.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4499" version="1" class="patch">
	<metadata>
		<title>security update for gnome-remote-desktop (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-5024" ref_url="https://www.suse.com/security/cve/CVE-2025-5024/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10631.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10631.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-5024/">CVE-2025-5024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5024">CVE-2025-5024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999423" comment="gnome-remote-desktop-40.0-11.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4500" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-1009" ref_url="https://www.suse.com/security/cve/CVE-2025-1009/" source="CVE"/>
		<reference ref_id="CVE-2025-1010" ref_url="https://www.suse.com/security/cve/CVE-2025-1010/" source="CVE"/>
		<reference ref_id="CVE-2025-1011" ref_url="https://www.suse.com/security/cve/CVE-2025-1011/" source="CVE"/>
		<reference ref_id="CVE-2025-1012" ref_url="https://www.suse.com/security/cve/CVE-2025-1012/" source="CVE"/>
		<reference ref_id="CVE-2025-1013" ref_url="https://www.suse.com/security/cve/CVE-2025-1013/" source="CVE"/>
		<reference ref_id="CVE-2025-1014" ref_url="https://www.suse.com/security/cve/CVE-2025-1014/" source="CVE"/>
		<reference ref_id="CVE-2025-1016" ref_url="https://www.suse.com/security/cve/CVE-2025-1016/" source="CVE"/>
		<reference ref_id="CVE-2025-1017" ref_url="https://www.suse.com/security/cve/CVE-2025-1017/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1066.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1066.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1009/">CVE-2025-1009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1009">CVE-2025-1009 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1010/">CVE-2025-1010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1010">CVE-2025-1010 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1011/">CVE-2025-1011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1011">CVE-2025-1011 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1012/">CVE-2025-1012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1012">CVE-2025-1012 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-1013/">CVE-2025-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1013">CVE-2025-1013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1014/">CVE-2025-1014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1014">CVE-2025-1014 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1016/">CVE-2025-1016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1016">CVE-2025-1016 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1017/">CVE-2025-1017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1017">CVE-2025-1017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963164" comment="firefox-128.7.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963165" comment="firefox-x11-128.7.0-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4501" version="1" class="patch">
	<metadata>
		<title>security update for golang (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22874" ref_url="https://www.suse.com/security/cve/CVE-2025-22874/" source="CVE"/>
		<reference ref_id="CVE-2025-4673" ref_url="https://www.suse.com/security/cve/CVE-2025-4673/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10676.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10676.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22874/">CVE-2025-22874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22874">CVE-2025-22874 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4673/">CVE-2025-4673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4673">CVE-2025-4673 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999424" comment="go-toolset-1.24.4-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999425" comment="golang-1.24.4-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999426" comment="golang-bin-1.24.4-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999427" comment="golang-docs-1.24.4-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999428" comment="golang-misc-1.24.4-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999429" comment="golang-race-1.24.4-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999430" comment="golang-src-1.24.4-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999431" comment="golang-tests-1.24.4-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4502" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-49794" ref_url="https://www.suse.com/security/cve/CVE-2025-49794/" source="CVE"/>
		<reference ref_id="CVE-2025-49796" ref_url="https://www.suse.com/security/cve/CVE-2025-49796/" source="CVE"/>
		<reference ref_id="CVE-2025-6021" ref_url="https://www.suse.com/security/cve/CVE-2025-6021/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10699.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10699.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49794/">CVE-2025-49794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49794">CVE-2025-49794 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-49796/">CVE-2025-49796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49796">CVE-2025-49796 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6021/">CVE-2025-6021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6021">CVE-2025-6021 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999607" comment="libxml2-2.9.13-10.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999608" comment="libxml2-devel-2.9.13-10.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999609" comment="python3-libxml2-2.9.13-10.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4503" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21991" ref_url="https://www.suse.com/security/cve/CVE-2025-21991/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10837.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10837.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21991/">CVE-2025-21991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21991">CVE-2025-21991 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010006289" comment="kernel-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006290" comment="kernel-abi-stablelists-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006291" comment="kernel-core-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006292" comment="kernel-cross-headers-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006293" comment="kernel-debug-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006294" comment="kernel-debug-core-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006297" comment="kernel-debug-modules-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006298" comment="kernel-debug-modules-core-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006299" comment="kernel-debug-modules-extra-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006300" comment="kernel-debug-uki-virt-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006303" comment="kernel-doc-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006304" comment="kernel-headers-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006305" comment="kernel-modules-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006306" comment="kernel-modules-core-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006307" comment="kernel-modules-extra-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006308" comment="kernel-rt-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006309" comment="kernel-rt-core-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006310" comment="kernel-rt-debug-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006311" comment="kernel-rt-debug-core-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006313" comment="kernel-rt-debug-kvm-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006314" comment="kernel-rt-debug-modules-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006315" comment="kernel-rt-debug-modules-core-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006316" comment="kernel-rt-debug-modules-extra-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006318" comment="kernel-rt-kvm-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006319" comment="kernel-rt-modules-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006320" comment="kernel-rt-modules-core-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006321" comment="kernel-rt-modules-extra-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006322" comment="kernel-tools-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006323" comment="kernel-tools-libs-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006325" comment="kernel-uki-virt-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006326" comment="kernel-uki-virt-addons-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006327" comment="libperf-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006328" comment="perf-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006329" comment="python3-perf-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006330" comment="rtla-5.14.0-570.26.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006331" comment="rv-5.14.0-570.26.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4504" version="1" class="patch">
	<metadata>
		<title>security update for cloud-init (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-6174" ref_url="https://www.suse.com/security/cve/CVE-2024-6174/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10848.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10848.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6174/">CVE-2024-6174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6174">CVE-2024-6174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006152" comment="cloud-init-24.4-4.el9_6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4505" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-30761" ref_url="https://www.suse.com/security/cve/CVE-2025-30761/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10862.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10862.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-30761/">CVE-2025-30761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30761">CVE-2025-30761 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008294" comment="java-1.8.0-openjdk-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008295" comment="java-1.8.0-openjdk-accessibility-1.8.0.462.b08-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008296" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.462.b08-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008297" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.462.b08-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008298" comment="java-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008299" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008300" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008301" comment="java-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008302" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008303" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008304" comment="java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008305" comment="java-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008306" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008307" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008308" comment="java-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008309" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008310" comment="java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008311" comment="java-1.8.0-openjdk-src-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008312" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008313" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4506" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-30761" ref_url="https://www.suse.com/security/cve/CVE-2025-30761/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10865.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10865.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-30761/">CVE-2025-30761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30761">CVE-2025-30761 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011414" comment="java-11-openjdk-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011166" comment="java-11-openjdk-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011415" comment="java-11-openjdk-demo-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011168" comment="java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011169" comment="java-11-openjdk-demo-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011170" comment="java-11-openjdk-demo-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011416" comment="java-11-openjdk-devel-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011172" comment="java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011173" comment="java-11-openjdk-devel-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011174" comment="java-11-openjdk-devel-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011175" comment="java-11-openjdk-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011417" comment="java-11-openjdk-headless-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011177" comment="java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011178" comment="java-11-openjdk-headless-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011179" comment="java-11-openjdk-headless-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011418" comment="java-11-openjdk-javadoc-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011181" comment="java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011419" comment="java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011183" comment="java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011420" comment="java-11-openjdk-jmods-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011185" comment="java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011186" comment="java-11-openjdk-jmods-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011187" comment="java-11-openjdk-jmods-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011188" comment="java-11-openjdk-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011421" comment="java-11-openjdk-src-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011190" comment="java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011191" comment="java-11-openjdk-src-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011192" comment="java-11-openjdk-src-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011422" comment="java-11-openjdk-static-libs-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011194" comment="java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011195" comment="java-11-openjdk-static-libs-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011196" comment="java-11-openjdk-static-libs-slowdebug-11.0.28.0.6-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4507" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10867.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10867.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010007998" comment="java-17-openjdk-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007999" comment="java-17-openjdk-demo-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008000" comment="java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008001" comment="java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008002" comment="java-17-openjdk-devel-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008003" comment="java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008004" comment="java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008005" comment="java-17-openjdk-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008006" comment="java-17-openjdk-headless-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008007" comment="java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008008" comment="java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008009" comment="java-17-openjdk-javadoc-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008010" comment="java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008011" comment="java-17-openjdk-jmods-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008012" comment="java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008013" comment="java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008014" comment="java-17-openjdk-slowdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008015" comment="java-17-openjdk-src-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008016" comment="java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008017" comment="java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008018" comment="java-17-openjdk-static-libs-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008019" comment="java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008020" comment="java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4508" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10873.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10873.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022816" comment="java-21-openjdk-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022817" comment="java-21-openjdk-demo-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022818" comment="java-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022819" comment="java-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022820" comment="java-21-openjdk-devel-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022821" comment="java-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022822" comment="java-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022823" comment="java-21-openjdk-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022824" comment="java-21-openjdk-headless-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022825" comment="java-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022826" comment="java-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022827" comment="java-21-openjdk-javadoc-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022828" comment="java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022829" comment="java-21-openjdk-jmods-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022830" comment="java-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022831" comment="java-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022832" comment="java-21-openjdk-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022833" comment="java-21-openjdk-src-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022834" comment="java-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022835" comment="java-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022836" comment="java-21-openjdk-static-libs-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022837" comment="java-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022838" comment="java-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4509" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-52533" ref_url="https://www.suse.com/security/cve/CVE-2024-52533/" source="CVE"/>
		<reference ref_id="CVE-2025-4373" ref_url="https://www.suse.com/security/cve/CVE-2025-4373/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11140.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11140.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52533/">CVE-2024-52533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52533">CVE-2024-52533 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4373/">CVE-2025-4373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4373">CVE-2025-4373 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010007811" comment="glib2-2.68.4-16.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007812" comment="glib2-devel-2.68.4-16.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007813" comment="glib2-doc-2.68.4-16.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007814" comment="glib2-static-2.68.4-16.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007815" comment="glib2-tests-2.68.4-16.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4510" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-56337" ref_url="https://www.suse.com/security/cve/CVE-2024-56337/" source="CVE"/>
		<reference ref_id="CVE-2025-31650" ref_url="https://www.suse.com/security/cve/CVE-2025-31650/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11335.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11335.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56337/">CVE-2024-56337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56337">CVE-2024-56337 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31650/">CVE-2025-31650 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31650">CVE-2025-31650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008048" comment="tomcat-9.0.87-3.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008049" comment="tomcat-admin-webapps-9.0.87-3.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008050" comment="tomcat-docs-webapp-9.0.87-3.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008051" comment="tomcat-el-3.0-api-9.0.87-3.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008052" comment="tomcat-jsp-2.3-api-9.0.87-3.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008053" comment="tomcat-lib-9.0.87-3.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008054" comment="tomcat-servlet-4.0-api-9.0.87-3.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008055" comment="tomcat-webapps-9.0.87-3.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4511" version="1" class="patch">
	<metadata>
		<title>security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-52615" ref_url="https://www.suse.com/security/cve/CVE-2024-52615/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11402.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11402.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52615/">CVE-2024-52615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52615">CVE-2024-52615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008992" comment="avahi-0.8-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008993" comment="avahi-autoipd-0.8-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008994" comment="avahi-compat-howl-0.8-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008995" comment="avahi-compat-howl-devel-0.8-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008996" comment="avahi-compat-libdns_sd-0.8-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008997" comment="avahi-compat-libdns_sd-devel-0.8-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008998" comment="avahi-devel-0.8-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008999" comment="avahi-glib-0.8-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009000" comment="avahi-glib-devel-0.8-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009001" comment="avahi-gobject-0.8-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009002" comment="avahi-gobject-devel-0.8-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009003" comment="avahi-libs-0.8-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009004" comment="avahi-tools-0.8-22.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4512" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-58002" ref_url="https://www.suse.com/security/cve/CVE-2024-58002/" source="CVE"/>
		<reference ref_id="CVE-2025-38089" ref_url="https://www.suse.com/security/cve/CVE-2025-38089/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11411.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11411.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58002/">CVE-2024-58002 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58002">CVE-2024-58002 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38089/">CVE-2025-38089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38089">CVE-2025-38089 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010009005" comment="kernel-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009006" comment="kernel-abi-stablelists-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009007" comment="kernel-core-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009008" comment="kernel-cross-headers-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009009" comment="kernel-debug-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009010" comment="kernel-debug-core-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009013" comment="kernel-debug-modules-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009014" comment="kernel-debug-modules-core-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009015" comment="kernel-debug-modules-extra-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009016" comment="kernel-debug-uki-virt-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009019" comment="kernel-doc-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009020" comment="kernel-headers-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009021" comment="kernel-modules-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009022" comment="kernel-modules-core-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009023" comment="kernel-modules-extra-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009024" comment="kernel-rt-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009025" comment="kernel-rt-core-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009026" comment="kernel-rt-debug-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009027" comment="kernel-rt-debug-core-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009029" comment="kernel-rt-debug-kvm-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009030" comment="kernel-rt-debug-modules-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009031" comment="kernel-rt-debug-modules-core-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009032" comment="kernel-rt-debug-modules-extra-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009034" comment="kernel-rt-kvm-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009035" comment="kernel-rt-modules-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009036" comment="kernel-rt-modules-core-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009037" comment="kernel-rt-modules-extra-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009038" comment="kernel-tools-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009039" comment="kernel-tools-libs-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009041" comment="kernel-uki-virt-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009042" comment="kernel-uki-virt-addons-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009043" comment="libperf-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009044" comment="perf-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009045" comment="python3-perf-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009046" comment="rtla-5.14.0-570.28.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009047" comment="rv-5.14.0-570.28.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4513" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-32023" ref_url="https://www.suse.com/security/cve/CVE-2025-32023/" source="CVE"/>
		<reference ref_id="CVE-2025-48367" ref_url="https://www.suse.com/security/cve/CVE-2025-48367/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11453.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11453.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32023/">CVE-2025-32023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32023">CVE-2025-32023 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48367/">CVE-2025-48367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48367">CVE-2025-48367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010009048" comment="redis-6.2.19-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009049" comment="redis-devel-6.2.19-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009050" comment="redis-doc-6.2.19-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4514" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-50349" ref_url="https://www.suse.com/security/cve/CVE-2024-50349/" source="CVE"/>
		<reference ref_id="CVE-2024-52006" ref_url="https://www.suse.com/security/cve/CVE-2024-52006/" source="CVE"/>
		<reference ref_id="CVE-2025-27613" ref_url="https://www.suse.com/security/cve/CVE-2025-27613/" source="CVE"/>
		<reference ref_id="CVE-2025-27614" ref_url="https://www.suse.com/security/cve/CVE-2025-27614/" source="CVE"/>
		<reference ref_id="CVE-2025-46835" ref_url="https://www.suse.com/security/cve/CVE-2025-46835/" source="CVE"/>
		<reference ref_id="CVE-2025-48384" ref_url="https://www.suse.com/security/cve/CVE-2025-48384/" source="CVE"/>
		<reference ref_id="CVE-2025-48385" ref_url="https://www.suse.com/security/cve/CVE-2025-48385/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11462.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11462.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-50349/">CVE-2024-50349 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50349">CVE-2024-50349 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-52006/">CVE-2024-52006 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52006">CVE-2024-52006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27613/">CVE-2025-27613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27613">CVE-2025-27613 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27614/">CVE-2025-27614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27614">CVE-2025-27614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46835/">CVE-2025-46835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46835">CVE-2025-46835 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48384/">CVE-2025-48384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48384">CVE-2025-48384 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48385/">CVE-2025-48385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48385">CVE-2025-48385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010009051" comment="git-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009052" comment="git-all-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009053" comment="git-core-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009054" comment="git-core-doc-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009055" comment="git-credential-libsecret-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009056" comment="git-daemon-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009057" comment="git-email-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009058" comment="git-gui-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009059" comment="git-instaweb-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009060" comment="git-subtree-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009061" comment="git-svn-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009062" comment="gitk-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009063" comment="gitweb-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009064" comment="perl-Git-2.47.3-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009065" comment="perl-Git-SVN-2.47.3-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4515" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11463.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11463.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010009469" comment="fence-agents-aliyun-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009470" comment="fence-agents-all-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009471" comment="fence-agents-amt-ws-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009472" comment="fence-agents-apc-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009473" comment="fence-agents-apc-snmp-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009474" comment="fence-agents-aws-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009475" comment="fence-agents-azure-arm-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009476" comment="fence-agents-bladecenter-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009477" comment="fence-agents-brocade-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009478" comment="fence-agents-cisco-mds-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009479" comment="fence-agents-cisco-ucs-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009480" comment="fence-agents-common-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009481" comment="fence-agents-compute-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009482" comment="fence-agents-drac5-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009483" comment="fence-agents-eaton-snmp-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009484" comment="fence-agents-emerson-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009485" comment="fence-agents-eps-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009486" comment="fence-agents-gce-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009487" comment="fence-agents-heuristics-ping-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009488" comment="fence-agents-hpblade-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009489" comment="fence-agents-ibm-powervs-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009490" comment="fence-agents-ibm-vpc-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009491" comment="fence-agents-ibmblade-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009492" comment="fence-agents-ifmib-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009493" comment="fence-agents-ilo-moonshot-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009494" comment="fence-agents-ilo-mp-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009495" comment="fence-agents-ilo-ssh-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009496" comment="fence-agents-ilo2-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009497" comment="fence-agents-intelmodular-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009498" comment="fence-agents-ipdu-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009499" comment="fence-agents-ipmilan-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009500" comment="fence-agents-kdump-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009501" comment="fence-agents-kubevirt-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009502" comment="fence-agents-lpar-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009503" comment="fence-agents-mpath-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009504" comment="fence-agents-openstack-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009505" comment="fence-agents-redfish-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009506" comment="fence-agents-rhevm-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009507" comment="fence-agents-rsa-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009508" comment="fence-agents-rsb-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009509" comment="fence-agents-sbd-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009510" comment="fence-agents-scsi-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009511" comment="fence-agents-virsh-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009512" comment="fence-agents-vmware-rest-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009513" comment="fence-agents-vmware-soap-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009514" comment="fence-agents-wti-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009515" comment="fence-virt-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009516" comment="fence-virtd-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009517" comment="fence-virtd-cpg-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009518" comment="fence-virtd-libvirt-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009519" comment="fence-virtd-multicast-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009520" comment="fence-virtd-serial-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009521" comment="fence-virtd-tcp-4.10.0-86.el9_6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009522" comment="ha-cloud-support-4.10.0-86.el9_6.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4516" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-8027" ref_url="https://www.suse.com/security/cve/CVE-2025-8027/" source="CVE"/>
		<reference ref_id="CVE-2025-8028" ref_url="https://www.suse.com/security/cve/CVE-2025-8028/" source="CVE"/>
		<reference ref_id="CVE-2025-8029" ref_url="https://www.suse.com/security/cve/CVE-2025-8029/" source="CVE"/>
		<reference ref_id="CVE-2025-8030" ref_url="https://www.suse.com/security/cve/CVE-2025-8030/" source="CVE"/>
		<reference ref_id="CVE-2025-8031" ref_url="https://www.suse.com/security/cve/CVE-2025-8031/" source="CVE"/>
		<reference ref_id="CVE-2025-8032" ref_url="https://www.suse.com/security/cve/CVE-2025-8032/" source="CVE"/>
		<reference ref_id="CVE-2025-8033" ref_url="https://www.suse.com/security/cve/CVE-2025-8033/" source="CVE"/>
		<reference ref_id="CVE-2025-8034" ref_url="https://www.suse.com/security/cve/CVE-2025-8034/" source="CVE"/>
		<reference ref_id="CVE-2025-8035" ref_url="https://www.suse.com/security/cve/CVE-2025-8035/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11748.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11748.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8027/">CVE-2025-8027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8027">CVE-2025-8027 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8028/">CVE-2025-8028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8028">CVE-2025-8028 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8029/">CVE-2025-8029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8029">CVE-2025-8029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8030/">CVE-2025-8030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8030">CVE-2025-8030 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8031/">CVE-2025-8031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8031">CVE-2025-8031 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8032/">CVE-2025-8032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8032">CVE-2025-8032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8033/">CVE-2025-8033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8033">CVE-2025-8033 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8034/">CVE-2025-8034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8034">CVE-2025-8034 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8035/">CVE-2025-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8035">CVE-2025-8035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010154" comment="firefox-128.13.0-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010155" comment="firefox-x11-128.13.0-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4517" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-6965" ref_url="https://www.suse.com/security/cve/CVE-2025-6965/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11802.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11802.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-6965/">CVE-2025-6965 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965">CVE-2025-6965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011255" comment="nodejs-22.16.0-2.module+el9.6.0+23339+d3c8acfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011256" comment="nodejs-devel-22.16.0-2.module+el9.6.0+23339+d3c8acfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011257" comment="nodejs-docs-22.16.0-2.module+el9.6.0+23339+d3c8acfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011258" comment="nodejs-full-i18n-22.16.0-2.module+el9.6.0+23339+d3c8acfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011259" comment="nodejs-libs-22.16.0-2.module+el9.6.0+23339+d3c8acfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011260" comment="nodejs-nodemon-3.0.1-1.module+el9.6.0+23339+d3c8acfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011261" comment="nodejs-packaging-2021.06-4.module+el9.6.0+23339+d3c8acfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011262" comment="nodejs-packaging-bundler-2021.06-4.module+el9.6.0+23339+d3c8acfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011263" comment="npm-10.9.2-1.22.16.0.2.module+el9.6.0+23339+d3c8acfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011264" comment="v8-12.4-devel-12.4.254.21-1.22.16.0.2.module+el9.6.0+23339+d3c8acfa is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4518" version="1" class="patch">
	<metadata>
		<title>security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-40909" ref_url="https://www.suse.com/security/cve/CVE-2025-40909/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11804.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11804.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-40909/">CVE-2025-40909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40909">CVE-2025-40909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011265" comment="perl-5.32.1-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011266" comment="perl-Attribute-Handlers-1.01-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011267" comment="perl-AutoLoader-5.74-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011268" comment="perl-AutoSplit-5.74-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011269" comment="perl-B-1.80-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011270" comment="perl-Benchmark-1.23-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011271" comment="perl-Class-Struct-0.66-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011272" comment="perl-Config-Extensions-0.03-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011273" comment="perl-DBM_Filter-0.06-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011274" comment="perl-Devel-Peek-1.28-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011275" comment="perl-Devel-SelfStubber-1.06-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011276" comment="perl-DirHandle-1.05-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011277" comment="perl-Dumpvalue-2.27-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011278" comment="perl-DynaLoader-1.47-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011279" comment="perl-English-1.11-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011280" comment="perl-Errno-1.30-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011281" comment="perl-ExtUtils-Constant-0.25-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011282" comment="perl-ExtUtils-Embed-1.35-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011283" comment="perl-ExtUtils-Miniperl-1.09-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011284" comment="perl-Fcntl-1.13-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011285" comment="perl-File-Basename-2.85-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011286" comment="perl-File-Compare-1.100.600-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011287" comment="perl-File-Copy-2.34-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011288" comment="perl-File-DosGlob-1.12-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011289" comment="perl-File-Find-1.37-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011290" comment="perl-File-stat-1.09-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011291" comment="perl-FileCache-1.10-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011292" comment="perl-FileHandle-2.03-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011293" comment="perl-FindBin-1.51-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011294" comment="perl-GDBM_File-1.18-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011295" comment="perl-Getopt-Std-1.12-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011296" comment="perl-Hash-Util-0.23-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011297" comment="perl-Hash-Util-FieldHash-1.20-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011298" comment="perl-I18N-Collate-1.02-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011299" comment="perl-I18N-LangTags-0.44-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011300" comment="perl-I18N-Langinfo-0.19-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011301" comment="perl-IO-1.43-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011302" comment="perl-IPC-Open3-1.21-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011303" comment="perl-Locale-Maketext-Simple-0.21-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011304" comment="perl-Math-Complex-1.59-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011305" comment="perl-Memoize-1.03-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011306" comment="perl-Module-Loaded-0.08-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011307" comment="perl-NDBM_File-1.15-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011308" comment="perl-NEXT-0.67-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011309" comment="perl-Net-1.02-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011310" comment="perl-ODBM_File-1.16-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011311" comment="perl-Opcode-1.48-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011312" comment="perl-POSIX-1.94-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011313" comment="perl-Pod-Functions-1.13-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011314" comment="perl-Pod-Html-1.25-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011315" comment="perl-Safe-2.41-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011316" comment="perl-Search-Dict-1.07-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011317" comment="perl-SelectSaver-1.02-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011318" comment="perl-SelfLoader-1.26-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011319" comment="perl-Symbol-1.08-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011320" comment="perl-Sys-Hostname-1.23-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011321" comment="perl-Term-Complete-1.403-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011322" comment="perl-Term-ReadLine-1.17-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011323" comment="perl-Test-1.31-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011324" comment="perl-Text-Abbrev-1.02-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011325" comment="perl-Thread-3.05-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011326" comment="perl-Thread-Semaphore-2.13-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011327" comment="perl-Tie-4.6-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011328" comment="perl-Tie-File-1.06-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011329" comment="perl-Tie-Memoize-1.1-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011330" comment="perl-Time-1.03-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011331" comment="perl-Time-Piece-1.3401-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011332" comment="perl-Unicode-UCD-0.75-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011333" comment="perl-User-pwent-1.03-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011334" comment="perl-autouse-1.11-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011335" comment="perl-base-2.27-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011336" comment="perl-blib-1.07-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011337" comment="perl-debugger-1.56-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011338" comment="perl-deprecate-0.04-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011339" comment="perl-devel-5.32.1-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011340" comment="perl-diagnostics-1.37-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011341" comment="perl-doc-5.32.1-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011342" comment="perl-encoding-warnings-0.13-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011343" comment="perl-fields-2.27-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011344" comment="perl-filetest-1.03-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011345" comment="perl-if-0.60.800-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011346" comment="perl-interpreter-5.32.1-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011347" comment="perl-less-0.03-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011348" comment="perl-lib-0.65-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011349" comment="perl-libnetcfg-5.32.1-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011350" comment="perl-libs-5.32.1-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011351" comment="perl-locale-1.09-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011352" comment="perl-macros-5.32.1-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011353" comment="perl-meta-notation-5.32.1-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011354" comment="perl-mro-1.23-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011355" comment="perl-open-1.12-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011356" comment="perl-overload-1.31-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011357" comment="perl-overloading-0.02-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011358" comment="perl-ph-5.32.1-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011359" comment="perl-sigtrap-1.09-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011360" comment="perl-sort-2.04-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011361" comment="perl-subs-1.03-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011362" comment="perl-utils-5.32.1-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011363" comment="perl-vars-1.05-481.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011364" comment="perl-vmsish-1.04-481.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4519" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-0510" ref_url="https://www.suse.com/security/cve/CVE-2025-0510/" source="CVE"/>
		<reference ref_id="CVE-2025-1009" ref_url="https://www.suse.com/security/cve/CVE-2025-1009/" source="CVE"/>
		<reference ref_id="CVE-2025-1010" ref_url="https://www.suse.com/security/cve/CVE-2025-1010/" source="CVE"/>
		<reference ref_id="CVE-2025-1011" ref_url="https://www.suse.com/security/cve/CVE-2025-1011/" source="CVE"/>
		<reference ref_id="CVE-2025-1012" ref_url="https://www.suse.com/security/cve/CVE-2025-1012/" source="CVE"/>
		<reference ref_id="CVE-2025-1013" ref_url="https://www.suse.com/security/cve/CVE-2025-1013/" source="CVE"/>
		<reference ref_id="CVE-2025-1014" ref_url="https://www.suse.com/security/cve/CVE-2025-1014/" source="CVE"/>
		<reference ref_id="CVE-2025-1015" ref_url="https://www.suse.com/security/cve/CVE-2025-1015/" source="CVE"/>
		<reference ref_id="CVE-2025-1016" ref_url="https://www.suse.com/security/cve/CVE-2025-1016/" source="CVE"/>
		<reference ref_id="CVE-2025-1017" ref_url="https://www.suse.com/security/cve/CVE-2025-1017/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1184.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1184.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-0510/">CVE-2025-0510 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0510">CVE-2025-0510 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1009/">CVE-2025-1009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1009">CVE-2025-1009 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1010/">CVE-2025-1010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1010">CVE-2025-1010 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1011/">CVE-2025-1011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1011">CVE-2025-1011 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1012/">CVE-2025-1012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1012">CVE-2025-1012 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-1013/">CVE-2025-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1013">CVE-2025-1013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1014/">CVE-2025-1014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1014">CVE-2025-1014 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1015/">CVE-2025-1015 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1015">CVE-2025-1015 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1016/">CVE-2025-1016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1016">CVE-2025-1016 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1017/">CVE-2025-1017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1017">CVE-2025-1017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963166" comment="thunderbird-128.7.0-1.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4520" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-5994" ref_url="https://www.suse.com/security/cve/CVE-2025-5994/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11849.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11849.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-5994/">CVE-2025-5994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5994">CVE-2025-5994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010539" comment="python3-unbound-1.16.2-19.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010540" comment="unbound-1.16.2-19.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010541" comment="unbound-devel-1.16.2-19.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010542" comment="unbound-dracut-1.16.2-19.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010543" comment="unbound-libs-1.16.2-19.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4521" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-57980" ref_url="https://www.suse.com/security/cve/CVE-2024-57980/" source="CVE"/>
		<reference ref_id="CVE-2025-21905" ref_url="https://www.suse.com/security/cve/CVE-2025-21905/" source="CVE"/>
		<reference ref_id="CVE-2025-22085" ref_url="https://www.suse.com/security/cve/CVE-2025-22085/" source="CVE"/>
		<reference ref_id="CVE-2025-22091" ref_url="https://www.suse.com/security/cve/CVE-2025-22091/" source="CVE"/>
		<reference ref_id="CVE-2025-22113" ref_url="https://www.suse.com/security/cve/CVE-2025-22113/" source="CVE"/>
		<reference ref_id="CVE-2025-22121" ref_url="https://www.suse.com/security/cve/CVE-2025-22121/" source="CVE"/>
		<reference ref_id="CVE-2025-37797" ref_url="https://www.suse.com/security/cve/CVE-2025-37797/" source="CVE"/>
		<reference ref_id="CVE-2025-37958" ref_url="https://www.suse.com/security/cve/CVE-2025-37958/" source="CVE"/>
		<reference ref_id="CVE-2025-38086" ref_url="https://www.suse.com/security/cve/CVE-2025-38086/" source="CVE"/>
		<reference ref_id="CVE-2025-38110" ref_url="https://www.suse.com/security/cve/CVE-2025-38110/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11861.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11861.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57980/">CVE-2024-57980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57980">CVE-2024-57980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21905/">CVE-2025-21905 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21905">CVE-2025-21905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22085/">CVE-2025-22085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22085">CVE-2025-22085 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22091/">CVE-2025-22091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22091">CVE-2025-22091 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22113/">CVE-2025-22113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22113">CVE-2025-22113 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22121/">CVE-2025-22121 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22121">CVE-2025-22121 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37797/">CVE-2025-37797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37958/">CVE-2025-37958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37958">CVE-2025-37958 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38086/">CVE-2025-38086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38086">CVE-2025-38086 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38110/">CVE-2025-38110 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38110">CVE-2025-38110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011365" comment="kernel-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011366" comment="kernel-abi-stablelists-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011367" comment="kernel-core-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011368" comment="kernel-cross-headers-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011369" comment="kernel-debug-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011370" comment="kernel-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011373" comment="kernel-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011374" comment="kernel-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011375" comment="kernel-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011376" comment="kernel-debug-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011379" comment="kernel-doc-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011380" comment="kernel-headers-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011381" comment="kernel-modules-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011382" comment="kernel-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011383" comment="kernel-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011384" comment="kernel-rt-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011385" comment="kernel-rt-core-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011386" comment="kernel-rt-debug-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011387" comment="kernel-rt-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011389" comment="kernel-rt-debug-kvm-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011390" comment="kernel-rt-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011391" comment="kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011392" comment="kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011394" comment="kernel-rt-kvm-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011395" comment="kernel-rt-modules-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011396" comment="kernel-rt-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011397" comment="kernel-rt-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011398" comment="kernel-tools-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011399" comment="kernel-tools-libs-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011401" comment="kernel-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011402" comment="kernel-uki-virt-addons-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011403" comment="libperf-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011404" comment="perf-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011405" comment="python3-perf-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011406" comment="rtla-5.14.0-570.30.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011407" comment="rv-5.14.0-570.30.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4522" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-6965" ref_url="https://www.suse.com/security/cve/CVE-2025-6965/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11992.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11992.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-6965/">CVE-2025-6965 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965">CVE-2025-6965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011408" comment="sqlite-3.34.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011409" comment="sqlite-devel-3.34.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011410" comment="sqlite-libs-3.34.1-8.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4523" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-27151" ref_url="https://www.suse.com/security/cve/CVE-2025-27151/" source="CVE"/>
		<reference ref_id="CVE-2025-32023" ref_url="https://www.suse.com/security/cve/CVE-2025-32023/" source="CVE"/>
		<reference ref_id="CVE-2025-48367" ref_url="https://www.suse.com/security/cve/CVE-2025-48367/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12008.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12008.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-27151/">CVE-2025-27151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27151">CVE-2025-27151 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32023/">CVE-2025-32023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32023">CVE-2025-32023 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48367/">CVE-2025-48367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48367">CVE-2025-48367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011411" comment="redis-7.2.10-1.module+el9.6.0+23332+115a3b01 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011412" comment="redis-devel-7.2.10-1.module+el9.6.0+23332+115a3b01 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011413" comment="redis-doc-7.2.10-1.module+el9.6.0+23332+115a3b01 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4524" version="1" class="patch">
	<metadata>
		<title>security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-5222" ref_url="https://www.suse.com/security/cve/CVE-2025-5222/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12083.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12083.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-5222/">CVE-2025-5222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5222">CVE-2025-5222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011439" comment="icu-67.1-10.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011440" comment="libicu-67.1-10.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011441" comment="libicu-devel-67.1-10.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4525" version="1" class="patch">
	<metadata>
		<title>security update for tbb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1210.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1210.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963298" comment="python3-tbb-2020.3-8.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963299" comment="tbb-2020.3-8.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963300" comment="tbb-devel-2020.3-8.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963301" comment="tbb-doc-2020.3-8.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4526" version="1" class="patch">
	<metadata>
		<title>security update for libtpms (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-49133" ref_url="https://www.suse.com/security/cve/CVE-2025-49133/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12100.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12100.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-49133/">CVE-2025-49133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49133">CVE-2025-49133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011442" comment="libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4527" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-8027" ref_url="https://www.suse.com/security/cve/CVE-2025-8027/" source="CVE"/>
		<reference ref_id="CVE-2025-8028" ref_url="https://www.suse.com/security/cve/CVE-2025-8028/" source="CVE"/>
		<reference ref_id="CVE-2025-8029" ref_url="https://www.suse.com/security/cve/CVE-2025-8029/" source="CVE"/>
		<reference ref_id="CVE-2025-8030" ref_url="https://www.suse.com/security/cve/CVE-2025-8030/" source="CVE"/>
		<reference ref_id="CVE-2025-8031" ref_url="https://www.suse.com/security/cve/CVE-2025-8031/" source="CVE"/>
		<reference ref_id="CVE-2025-8032" ref_url="https://www.suse.com/security/cve/CVE-2025-8032/" source="CVE"/>
		<reference ref_id="CVE-2025-8033" ref_url="https://www.suse.com/security/cve/CVE-2025-8033/" source="CVE"/>
		<reference ref_id="CVE-2025-8034" ref_url="https://www.suse.com/security/cve/CVE-2025-8034/" source="CVE"/>
		<reference ref_id="CVE-2025-8035" ref_url="https://www.suse.com/security/cve/CVE-2025-8035/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12187.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12187.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8027/">CVE-2025-8027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8027">CVE-2025-8027 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8028/">CVE-2025-8028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8028">CVE-2025-8028 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8029/">CVE-2025-8029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8029">CVE-2025-8029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8030/">CVE-2025-8030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8030">CVE-2025-8030 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8031/">CVE-2025-8031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8031">CVE-2025-8031 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8032/">CVE-2025-8032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8032">CVE-2025-8032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8033/">CVE-2025-8033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8033">CVE-2025-8033 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8034/">CVE-2025-8034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8034">CVE-2025-8034 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8035/">CVE-2025-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8035">CVE-2025-8035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011443" comment="thunderbird-128.13.0-3.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4528" version="1" class="patch">
	<metadata>
		<title>security update for jackson-annotations (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-52999" ref_url="https://www.suse.com/security/cve/CVE-2025-52999/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12280.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12280.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52999/">CVE-2025-52999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52999">CVE-2025-52999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011535" comment="pki-jackson-annotations-2.19.1-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011536" comment="pki-jackson-core-2.19.1-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011537" comment="pki-jackson-databind-2.19.1-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011538" comment="pki-jackson-jaxrs-json-provider-2.19.1-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011539" comment="pki-jackson-jaxrs-providers-2.19.1-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011540" comment="pki-jackson-module-jaxb-annotations-2.19.1-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4529" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-7425" ref_url="https://www.suse.com/security/cve/CVE-2025-7425/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12447.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12447.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-7425/">CVE-2025-7425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7425">CVE-2025-7425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011646" comment="libxml2-2.9.13-11.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011647" comment="libxml2-devel-2.9.13-11.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011648" comment="python3-libxml2-2.9.13-11.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4530" version="1" class="patch">
	<metadata>
		<title>security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-47081" ref_url="https://www.suse.com/security/cve/CVE-2024-47081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12519.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12519.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47081/">CVE-2024-47081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47081">CVE-2024-47081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011990" comment="python3-requests-2.25.1-10.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011991" comment="python3-requests+security-2.25.1-10.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011992" comment="python3-requests+socks-2.25.1-10.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4531" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1262.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1262.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963302" comment="bpftool-7.4.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963303" comment="kernel-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963304" comment="kernel-abi-stablelists-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963305" comment="kernel-core-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963306" comment="kernel-cross-headers-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963307" comment="kernel-debug-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963308" comment="kernel-debug-core-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963311" comment="kernel-debug-modules-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963312" comment="kernel-debug-modules-core-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963313" comment="kernel-debug-modules-extra-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963314" comment="kernel-debug-uki-virt-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963317" comment="kernel-doc-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963318" comment="kernel-headers-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963319" comment="kernel-modules-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963320" comment="kernel-modules-core-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963321" comment="kernel-modules-extra-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963322" comment="kernel-tools-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963323" comment="kernel-tools-libs-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963325" comment="kernel-uki-virt-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963326" comment="kernel-uki-virt-addons-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963327" comment="libperf-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963328" comment="perf-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963329" comment="python3-perf-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963330" comment="rtla-5.14.0-503.23.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963331" comment="rv-5.14.0-503.23.2.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4532" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-49788" ref_url="https://www.suse.com/security/cve/CVE-2022-49788/" source="CVE"/>
		<reference ref_id="CVE-2025-21726" ref_url="https://www.suse.com/security/cve/CVE-2025-21726/" source="CVE"/>
		<reference ref_id="CVE-2025-21727" ref_url="https://www.suse.com/security/cve/CVE-2025-21727/" source="CVE"/>
		<reference ref_id="CVE-2025-21928" ref_url="https://www.suse.com/security/cve/CVE-2025-21928/" source="CVE"/>
		<reference ref_id="CVE-2025-21929" ref_url="https://www.suse.com/security/cve/CVE-2025-21929/" source="CVE"/>
		<reference ref_id="CVE-2025-21962" ref_url="https://www.suse.com/security/cve/CVE-2025-21962/" source="CVE"/>
		<reference ref_id="CVE-2025-22020" ref_url="https://www.suse.com/security/cve/CVE-2025-22020/" source="CVE"/>
		<reference ref_id="CVE-2025-37890" ref_url="https://www.suse.com/security/cve/CVE-2025-37890/" source="CVE"/>
		<reference ref_id="CVE-2025-38052" ref_url="https://www.suse.com/security/cve/CVE-2025-38052/" source="CVE"/>
		<reference ref_id="CVE-2025-38087" ref_url="https://www.suse.com/security/cve/CVE-2025-38087/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12746.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12746.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49788/">CVE-2022-49788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49788">CVE-2022-49788 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21726/">CVE-2025-21726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21726">CVE-2025-21726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21727/">CVE-2025-21727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21727">CVE-2025-21727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21928/">CVE-2025-21928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21928">CVE-2025-21928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21929/">CVE-2025-21929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21929">CVE-2025-21929 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21962/">CVE-2025-21962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21962">CVE-2025-21962 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22020/">CVE-2025-22020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22020">CVE-2025-22020 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37890/">CVE-2025-37890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37890">CVE-2025-37890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38052/">CVE-2025-38052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38087/">CVE-2025-38087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38087">CVE-2025-38087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012426" comment="kernel-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012427" comment="kernel-abi-stablelists-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012428" comment="kernel-core-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012429" comment="kernel-cross-headers-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012430" comment="kernel-debug-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012431" comment="kernel-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012434" comment="kernel-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012435" comment="kernel-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012436" comment="kernel-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012437" comment="kernel-debug-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012440" comment="kernel-doc-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012441" comment="kernel-headers-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012442" comment="kernel-modules-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012443" comment="kernel-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012444" comment="kernel-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012445" comment="kernel-rt-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012446" comment="kernel-rt-core-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012447" comment="kernel-rt-debug-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012448" comment="kernel-rt-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012450" comment="kernel-rt-debug-kvm-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012451" comment="kernel-rt-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012452" comment="kernel-rt-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012453" comment="kernel-rt-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012455" comment="kernel-rt-kvm-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012456" comment="kernel-rt-modules-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012457" comment="kernel-rt-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012458" comment="kernel-rt-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012459" comment="kernel-tools-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012460" comment="kernel-tools-libs-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012462" comment="kernel-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012463" comment="kernel-uki-virt-addons-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012464" comment="libperf-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012465" comment="perf-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012466" comment="python3-perf-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012467" comment="rtla-5.14.0-570.32.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012468" comment="rv-5.14.0-570.32.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4533" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-8058" ref_url="https://www.suse.com/security/cve/CVE-2025-8058/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12748.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12748.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H" href="https://www.suse.com/security/cve/CVE-2025-8058/">CVE-2025-8058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8058">CVE-2025-8058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012469" comment="glibc-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012470" comment="glibc-all-langpacks-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012471" comment="glibc-benchtests-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012472" comment="glibc-common-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012473" comment="glibc-devel-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012474" comment="glibc-doc-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012475" comment="glibc-gconv-extra-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012476" comment="glibc-headers-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012477" comment="glibc-langpack-aa-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012478" comment="glibc-langpack-af-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012479" comment="glibc-langpack-agr-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012480" comment="glibc-langpack-ak-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012481" comment="glibc-langpack-am-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012482" comment="glibc-langpack-an-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012483" comment="glibc-langpack-anp-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012484" comment="glibc-langpack-ar-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012485" comment="glibc-langpack-as-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012486" comment="glibc-langpack-ast-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012487" comment="glibc-langpack-ayc-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012488" comment="glibc-langpack-az-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012489" comment="glibc-langpack-be-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012490" comment="glibc-langpack-bem-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012491" comment="glibc-langpack-ber-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012492" comment="glibc-langpack-bg-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012493" comment="glibc-langpack-bhb-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012494" comment="glibc-langpack-bho-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012495" comment="glibc-langpack-bi-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012496" comment="glibc-langpack-bn-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012497" comment="glibc-langpack-bo-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012498" comment="glibc-langpack-br-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012499" comment="glibc-langpack-brx-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012500" comment="glibc-langpack-bs-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012501" comment="glibc-langpack-byn-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012502" comment="glibc-langpack-ca-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012503" comment="glibc-langpack-ce-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012504" comment="glibc-langpack-chr-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012505" comment="glibc-langpack-ckb-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012506" comment="glibc-langpack-cmn-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012507" comment="glibc-langpack-crh-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012508" comment="glibc-langpack-cs-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012509" comment="glibc-langpack-csb-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012510" comment="glibc-langpack-cv-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012511" comment="glibc-langpack-cy-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012512" comment="glibc-langpack-da-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012513" comment="glibc-langpack-de-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012514" comment="glibc-langpack-doi-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012515" comment="glibc-langpack-dsb-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012516" comment="glibc-langpack-dv-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012517" comment="glibc-langpack-dz-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012518" comment="glibc-langpack-el-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012519" comment="glibc-langpack-en-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012520" comment="glibc-langpack-eo-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012521" comment="glibc-langpack-es-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012522" comment="glibc-langpack-et-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012523" comment="glibc-langpack-eu-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012524" comment="glibc-langpack-fa-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012525" comment="glibc-langpack-ff-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012526" comment="glibc-langpack-fi-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012527" comment="glibc-langpack-fil-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012528" comment="glibc-langpack-fo-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012529" comment="glibc-langpack-fr-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012530" comment="glibc-langpack-fur-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012531" comment="glibc-langpack-fy-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012532" comment="glibc-langpack-ga-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012533" comment="glibc-langpack-gd-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012534" comment="glibc-langpack-gez-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012535" comment="glibc-langpack-gl-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012536" comment="glibc-langpack-gu-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012537" comment="glibc-langpack-gv-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012538" comment="glibc-langpack-ha-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012539" comment="glibc-langpack-hak-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012540" comment="glibc-langpack-he-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012541" comment="glibc-langpack-hi-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012542" comment="glibc-langpack-hif-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012543" comment="glibc-langpack-hne-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012544" comment="glibc-langpack-hr-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012545" comment="glibc-langpack-hsb-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012546" comment="glibc-langpack-ht-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012547" comment="glibc-langpack-hu-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012548" comment="glibc-langpack-hy-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012549" comment="glibc-langpack-ia-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012550" comment="glibc-langpack-id-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012551" comment="glibc-langpack-ig-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012552" comment="glibc-langpack-ik-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012553" comment="glibc-langpack-is-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012554" comment="glibc-langpack-it-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012555" comment="glibc-langpack-iu-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012556" comment="glibc-langpack-ja-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012557" comment="glibc-langpack-ka-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012558" comment="glibc-langpack-kab-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012559" comment="glibc-langpack-kk-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012560" comment="glibc-langpack-kl-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012561" comment="glibc-langpack-km-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012562" comment="glibc-langpack-kn-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012563" comment="glibc-langpack-ko-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012564" comment="glibc-langpack-kok-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012565" comment="glibc-langpack-ks-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012566" comment="glibc-langpack-ku-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012567" comment="glibc-langpack-kw-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012568" comment="glibc-langpack-ky-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012569" comment="glibc-langpack-lb-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012570" comment="glibc-langpack-lg-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012571" comment="glibc-langpack-li-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012572" comment="glibc-langpack-lij-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012573" comment="glibc-langpack-ln-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012574" comment="glibc-langpack-lo-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012575" comment="glibc-langpack-lt-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012576" comment="glibc-langpack-lv-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012577" comment="glibc-langpack-lzh-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012578" comment="glibc-langpack-mag-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012579" comment="glibc-langpack-mai-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012580" comment="glibc-langpack-mfe-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012581" comment="glibc-langpack-mg-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012582" comment="glibc-langpack-mhr-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012583" comment="glibc-langpack-mi-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012584" comment="glibc-langpack-miq-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012585" comment="glibc-langpack-mjw-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012586" comment="glibc-langpack-mk-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012587" comment="glibc-langpack-ml-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012588" comment="glibc-langpack-mn-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012589" comment="glibc-langpack-mni-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012590" comment="glibc-langpack-mnw-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012591" comment="glibc-langpack-mr-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012592" comment="glibc-langpack-ms-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012593" comment="glibc-langpack-mt-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012594" comment="glibc-langpack-my-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012595" comment="glibc-langpack-nan-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012596" comment="glibc-langpack-nb-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012597" comment="glibc-langpack-nds-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012598" comment="glibc-langpack-ne-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012599" comment="glibc-langpack-nhn-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012600" comment="glibc-langpack-niu-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012601" comment="glibc-langpack-nl-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012602" comment="glibc-langpack-nn-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012603" comment="glibc-langpack-nr-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012604" comment="glibc-langpack-nso-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012605" comment="glibc-langpack-oc-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012606" comment="glibc-langpack-om-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012607" comment="glibc-langpack-or-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012608" comment="glibc-langpack-os-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012609" comment="glibc-langpack-pa-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012610" comment="glibc-langpack-pap-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012611" comment="glibc-langpack-pl-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012612" comment="glibc-langpack-ps-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012613" comment="glibc-langpack-pt-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012614" comment="glibc-langpack-quz-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012615" comment="glibc-langpack-raj-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012616" comment="glibc-langpack-ro-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012617" comment="glibc-langpack-ru-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012618" comment="glibc-langpack-rw-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012619" comment="glibc-langpack-sa-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012620" comment="glibc-langpack-sah-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012621" comment="glibc-langpack-sat-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012622" comment="glibc-langpack-sc-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012623" comment="glibc-langpack-sd-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012624" comment="glibc-langpack-se-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012625" comment="glibc-langpack-sgs-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012626" comment="glibc-langpack-shn-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012627" comment="glibc-langpack-shs-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012628" comment="glibc-langpack-si-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012629" comment="glibc-langpack-sid-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012630" comment="glibc-langpack-sk-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012631" comment="glibc-langpack-sl-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012632" comment="glibc-langpack-sm-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012633" comment="glibc-langpack-so-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012634" comment="glibc-langpack-sq-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012635" comment="glibc-langpack-sr-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012636" comment="glibc-langpack-ss-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012637" comment="glibc-langpack-st-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012638" comment="glibc-langpack-sv-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012639" comment="glibc-langpack-sw-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012640" comment="glibc-langpack-szl-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012641" comment="glibc-langpack-ta-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012642" comment="glibc-langpack-tcy-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012643" comment="glibc-langpack-te-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012644" comment="glibc-langpack-tg-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012645" comment="glibc-langpack-th-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012646" comment="glibc-langpack-the-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012647" comment="glibc-langpack-ti-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012648" comment="glibc-langpack-tig-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012649" comment="glibc-langpack-tk-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012650" comment="glibc-langpack-tl-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012651" comment="glibc-langpack-tn-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012652" comment="glibc-langpack-to-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012653" comment="glibc-langpack-tpi-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012654" comment="glibc-langpack-tr-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012655" comment="glibc-langpack-ts-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012656" comment="glibc-langpack-tt-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012657" comment="glibc-langpack-ug-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012658" comment="glibc-langpack-uk-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012659" comment="glibc-langpack-unm-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012660" comment="glibc-langpack-ur-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012661" comment="glibc-langpack-uz-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012662" comment="glibc-langpack-ve-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012663" comment="glibc-langpack-vi-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012664" comment="glibc-langpack-wa-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012665" comment="glibc-langpack-wae-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012666" comment="glibc-langpack-wal-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012667" comment="glibc-langpack-wo-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012668" comment="glibc-langpack-xh-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012669" comment="glibc-langpack-yi-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012670" comment="glibc-langpack-yo-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012671" comment="glibc-langpack-yue-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012672" comment="glibc-langpack-yuw-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012673" comment="glibc-langpack-zh-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012674" comment="glibc-langpack-zu-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012675" comment="glibc-locale-source-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012676" comment="glibc-minimal-langpack-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012677" comment="glibc-nss-devel-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012678" comment="glibc-static-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012679" comment="glibc-utils-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012680" comment="libnsl-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012681" comment="nscd-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012682" comment="nss_db-2.34-168.el9_6.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012683" comment="nss_hesiod-2.34-168.el9_6.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4534" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12834.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12834.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012684" comment="python3.12-setuptools-68.2.2-5.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012685" comment="python3.12-setuptools-wheel-68.2.2-5.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4535" version="1" class="patch">
	<metadata>
		<title>security update for mod_security (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-48866" ref_url="https://www.suse.com/security/cve/CVE-2025-48866/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12838.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12838.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48866/">CVE-2025-48866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48866">CVE-2025-48866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013272" comment="mod_security-2.9.6-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013273" comment="mod_security-mlogc-2.9.6-2.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4536" version="1" class="patch">
	<metadata>
		<title>security update for gdk-pixbuf2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-7345" ref_url="https://www.suse.com/security/cve/CVE-2025-7345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12841.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12841.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7345/">CVE-2025-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7345">CVE-2025-7345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013274" comment="gdk-pixbuf2-2.42.6-6.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013275" comment="gdk-pixbuf2-devel-2.42.6-6.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013276" comment="gdk-pixbuf2-modules-2.42.6-6.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4537" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qt3d (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-3158" ref_url="https://www.suse.com/security/cve/CVE-2025-3158/" source="CVE"/>
		<reference ref_id="CVE-2025-3159" ref_url="https://www.suse.com/security/cve/CVE-2025-3159/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12842.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12842.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-3158/">CVE-2025-3158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3158">CVE-2025-3158 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-3159/">CVE-2025-3159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3159">CVE-2025-3159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013277" comment="qt5-qt3d-5.15.9-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013278" comment="qt5-qt3d-devel-5.15.9-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013279" comment="qt5-qt3d-examples-5.15.9-2.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4538" version="1" class="patch">
	<metadata>
		<title>security update for ncurses (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-29458" ref_url="https://www.suse.com/security/cve/CVE-2022-29458/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12876.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12876.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29458/">CVE-2022-29458 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">CVE-2022-29458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013280" comment="ncurses-6.2-10.20210508.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013281" comment="ncurses-base-6.2-10.20210508.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013282" comment="ncurses-c++-libs-6.2-10.20210508.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013283" comment="ncurses-devel-6.2-10.20210508.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013284" comment="ncurses-libs-6.2-10.20210508.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013285" comment="ncurses-term-6.2-10.20210508.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4539" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-14-gcc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1300.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1300.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963733" comment="gcc-toolset-14-gcc-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963734" comment="gcc-toolset-14-gcc-c++-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963735" comment="gcc-toolset-14-gcc-gfortran-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963736" comment="gcc-toolset-14-gcc-plugin-annobin-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963737" comment="gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963738" comment="gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963739" comment="gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963740" comment="gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963741" comment="gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963742" comment="gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963743" comment="gcc-toolset-14-liblsan-devel-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963744" comment="gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963745" comment="gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963746" comment="gcc-toolset-14-libstdc++-docs-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963747" comment="gcc-toolset-14-libtsan-devel-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963748" comment="gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963749" comment="gcc-toolset-14-offload-nvptx-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963750" comment="libasan8-14.2.1-1.3.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963751" comment="libtsan2-14.2.1-1.3.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4540" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-13-gcc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1309.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1309.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963752" comment="gcc-toolset-13-gcc-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963753" comment="gcc-toolset-13-gcc-c++-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963754" comment="gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963755" comment="gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963756" comment="gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963757" comment="gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963758" comment="gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963759" comment="gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963760" comment="gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963761" comment="gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963762" comment="gcc-toolset-13-liblsan-devel-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963763" comment="gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963764" comment="gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963765" comment="gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963766" comment="gcc-toolset-13-libtsan-devel-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963767" comment="gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963768" comment="gcc-toolset-13-offload-nvptx-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963769" comment="libasan8-13.3.1-2.2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963770" comment="libtsan2-13.3.1-2.2.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4541" version="1" class="patch">
	<metadata>
		<title>security update for doxygen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1329.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1329.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963381" comment="doxygen-1.9.1-12.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963382" comment="doxygen-doxywizard-1.9.1-12.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963383" comment="doxygen-latex-1.9.1-12.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4542" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-12797" ref_url="https://www.suse.com/security/cve/CVE-2024-12797/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1330.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1330.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12797/">CVE-2024-12797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12797">CVE-2024-12797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963384" comment="openssl-3.2.2-6.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963385" comment="openssl-devel-3.2.2-6.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963386" comment="openssl-libs-3.2.2-6.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963387" comment="openssl-perl-3.2.2-6.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4543" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-32414" ref_url="https://www.suse.com/security/cve/CVE-2025-32414/" source="CVE"/>
		<reference ref_id="CVE-2025-32415" ref_url="https://www.suse.com/security/cve/CVE-2025-32415/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13428.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13428.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-32414/">CVE-2025-32414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32414">CVE-2025-32414 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-32415/">CVE-2025-32415 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32415">CVE-2025-32415 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013159" comment="libxml2-2.9.13-12.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013160" comment="libxml2-devel-2.9.13-12.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013161" comment="python3-libxml2-2.9.13-12.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4544" version="1" class="patch">
	<metadata>
		<title>security update for gcc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1346.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1346.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963820" comment="cpp-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963821" comment="gcc-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963822" comment="gcc-c++-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963823" comment="gcc-gfortran-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963824" comment="gcc-offload-nvptx-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963825" comment="gcc-plugin-annobin-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963826" comment="gcc-plugin-devel-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963827" comment="libasan-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963828" comment="libatomic-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963829" comment="libgcc-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963830" comment="libgccjit-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963831" comment="libgccjit-devel-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963832" comment="libgfortran-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963833" comment="libgomp-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963834" comment="libgomp-offload-nvptx-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963835" comment="libitm-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963836" comment="libitm-devel-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963837" comment="liblsan-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963838" comment="libquadmath-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963839" comment="libquadmath-devel-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963840" comment="libstdc++-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963841" comment="libstdc++-devel-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963842" comment="libstdc++-docs-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963843" comment="libstdc++-static-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963844" comment="libtsan-11.5.0-5.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963845" comment="libubsan-11.5.0-5.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4545" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-49043" ref_url="https://www.suse.com/security/cve/CVE-2022-49043/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1350.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1350.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49043/">CVE-2022-49043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49043">CVE-2022-49043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963771" comment="libxml2-2.9.13-6.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963772" comment="libxml2-devel-2.9.13-6.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963773" comment="python3-libxml2-2.9.13-6.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4546" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13578.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13578.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013286" comment="python3.11-setuptools-65.5.1-4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013287" comment="python3.11-setuptools-wheel-65.5.1-4.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4547" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-38079" ref_url="https://www.suse.com/security/cve/CVE-2025-38079/" source="CVE"/>
		<reference ref_id="CVE-2025-38292" ref_url="https://www.suse.com/security/cve/CVE-2025-38292/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13602.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13602.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38079/">CVE-2025-38079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38292/">CVE-2025-38292 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38292">CVE-2025-38292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013382" comment="kernel-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013383" comment="kernel-abi-stablelists-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013384" comment="kernel-core-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013385" comment="kernel-cross-headers-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013386" comment="kernel-debug-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013387" comment="kernel-debug-core-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013390" comment="kernel-debug-modules-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013391" comment="kernel-debug-modules-core-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013392" comment="kernel-debug-modules-extra-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013393" comment="kernel-debug-uki-virt-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013396" comment="kernel-doc-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013397" comment="kernel-headers-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013398" comment="kernel-modules-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013399" comment="kernel-modules-core-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013400" comment="kernel-modules-extra-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013401" comment="kernel-rt-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013402" comment="kernel-rt-core-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013403" comment="kernel-rt-debug-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013404" comment="kernel-rt-debug-core-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013406" comment="kernel-rt-debug-kvm-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013407" comment="kernel-rt-debug-modules-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013408" comment="kernel-rt-debug-modules-core-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013409" comment="kernel-rt-debug-modules-extra-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013411" comment="kernel-rt-kvm-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013412" comment="kernel-rt-modules-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013413" comment="kernel-rt-modules-core-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013414" comment="kernel-rt-modules-extra-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013415" comment="kernel-tools-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013416" comment="kernel-tools-libs-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013418" comment="kernel-uki-virt-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013419" comment="kernel-uki-virt-addons-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013420" comment="libperf-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013421" comment="perf-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013422" comment="python3-perf-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013423" comment="rtla-5.14.0-570.33.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013424" comment="rv-5.14.0-570.33.2.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4548" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-31273" ref_url="https://www.suse.com/security/cve/CVE-2025-31273/" source="CVE"/>
		<reference ref_id="CVE-2025-31278" ref_url="https://www.suse.com/security/cve/CVE-2025-31278/" source="CVE"/>
		<reference ref_id="CVE-2025-43211" ref_url="https://www.suse.com/security/cve/CVE-2025-43211/" source="CVE"/>
		<reference ref_id="CVE-2025-43212" ref_url="https://www.suse.com/security/cve/CVE-2025-43212/" source="CVE"/>
		<reference ref_id="CVE-2025-43216" ref_url="https://www.suse.com/security/cve/CVE-2025-43216/" source="CVE"/>
		<reference ref_id="CVE-2025-43227" ref_url="https://www.suse.com/security/cve/CVE-2025-43227/" source="CVE"/>
		<reference ref_id="CVE-2025-43240" ref_url="https://www.suse.com/security/cve/CVE-2025-43240/" source="CVE"/>
		<reference ref_id="CVE-2025-43265" ref_url="https://www.suse.com/security/cve/CVE-2025-43265/" source="CVE"/>
		<reference ref_id="CVE-2025-6558" ref_url="https://www.suse.com/security/cve/CVE-2025-6558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13782.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13782.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31273/">CVE-2025-31273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31273">CVE-2025-31273 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31278/">CVE-2025-31278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31278">CVE-2025-31278 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43211/">CVE-2025-43211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43211">CVE-2025-43211 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43212/">CVE-2025-43212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43212">CVE-2025-43212 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43216/">CVE-2025-43216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43216">CVE-2025-43216 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43227/">CVE-2025-43227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43227">CVE-2025-43227 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43240/">CVE-2025-43240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43240">CVE-2025-43240 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43265/">CVE-2025-43265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43265">CVE-2025-43265 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-6558/">CVE-2025-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6558">CVE-2025-6558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013938" comment="webkit2gtk3-2.48.5-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013939" comment="webkit2gtk3-devel-2.48.5-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013940" comment="webkit2gtk3-jsc-2.48.5-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013941" comment="webkit2gtk3-jsc-devel-2.48.5-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4549" version="1" class="patch">
	<metadata>
		<title>security update for golang (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-4674" ref_url="https://www.suse.com/security/cve/CVE-2025-4674/" source="CVE"/>
		<reference ref_id="CVE-2025-47906" ref_url="https://www.suse.com/security/cve/CVE-2025-47906/" source="CVE"/>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13935.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13935.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4674/">CVE-2025-4674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47906/">CVE-2025-47906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47906">CVE-2025-47906 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015534" comment="go-toolset-1.24.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015535" comment="golang-1.24.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015536" comment="golang-bin-1.24.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015537" comment="golang-docs-1.24.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015538" comment="golang-misc-1.24.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015539" comment="golang-race-1.24.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015540" comment="golang-src-1.24.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015541" comment="golang-tests-1.24.6-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4550" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2025-21867" ref_url="https://www.suse.com/security/cve/CVE-2025-21867/" source="CVE"/>
		<reference ref_id="CVE-2025-38084" ref_url="https://www.suse.com/security/cve/CVE-2025-38084/" source="CVE"/>
		<reference ref_id="CVE-2025-38085" ref_url="https://www.suse.com/security/cve/CVE-2025-38085/" source="CVE"/>
		<reference ref_id="CVE-2025-38124" ref_url="https://www.suse.com/security/cve/CVE-2025-38124/" source="CVE"/>
		<reference ref_id="CVE-2025-38159" ref_url="https://www.suse.com/security/cve/CVE-2025-38159/" source="CVE"/>
		<reference ref_id="CVE-2025-38250" ref_url="https://www.suse.com/security/cve/CVE-2025-38250/" source="CVE"/>
		<reference ref_id="CVE-2025-38380" ref_url="https://www.suse.com/security/cve/CVE-2025-38380/" source="CVE"/>
		<reference ref_id="CVE-2025-38471" ref_url="https://www.suse.com/security/cve/CVE-2025-38471/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13962.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13962.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21867/">CVE-2025-21867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21867">CVE-2025-21867 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38084/">CVE-2025-38084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38084">CVE-2025-38084 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38085/">CVE-2025-38085 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38124/">CVE-2025-38124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38124">CVE-2025-38124 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38159/">CVE-2025-38159 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38159">CVE-2025-38159 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38250/">CVE-2025-38250 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38250">CVE-2025-38250 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38380/">CVE-2025-38380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38380">CVE-2025-38380 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H" cvss4="8.4/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38471/">CVE-2025-38471 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38471">CVE-2025-38471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015542" comment="kernel-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015543" comment="kernel-abi-stablelists-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015544" comment="kernel-core-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015545" comment="kernel-cross-headers-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015546" comment="kernel-debug-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015547" comment="kernel-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015550" comment="kernel-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015551" comment="kernel-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015552" comment="kernel-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015553" comment="kernel-debug-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015556" comment="kernel-doc-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015557" comment="kernel-headers-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015558" comment="kernel-modules-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015559" comment="kernel-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015560" comment="kernel-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015561" comment="kernel-rt-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015562" comment="kernel-rt-core-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015563" comment="kernel-rt-debug-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015564" comment="kernel-rt-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015566" comment="kernel-rt-debug-kvm-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015567" comment="kernel-rt-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015568" comment="kernel-rt-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015569" comment="kernel-rt-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015571" comment="kernel-rt-kvm-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015572" comment="kernel-rt-modules-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015573" comment="kernel-rt-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015574" comment="kernel-rt-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015575" comment="kernel-tools-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015576" comment="kernel-tools-libs-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015578" comment="kernel-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015579" comment="kernel-uki-virt-addons-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015580" comment="libperf-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015581" comment="perf-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015582" comment="python3-perf-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015583" comment="rtla-5.14.0-570.35.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015584" comment="rv-5.14.0-570.35.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4551" version="1" class="patch">
	<metadata>
		<title>security update for xterm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-24130" ref_url="https://www.suse.com/security/cve/CVE-2022-24130/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14075.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14075.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24130/">CVE-2022-24130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24130">CVE-2022-24130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015585" comment="xterm-366-12.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015586" comment="xterm-resize-366-12.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4552" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-5914" ref_url="https://www.suse.com/security/cve/CVE-2025-5914/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14130.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14130.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5914/">CVE-2025-5914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5914">CVE-2025-5914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015587" comment="bsdtar-3.5.3-6.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015588" comment="libarchive-3.5.3-6.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015589" comment="libarchive-devel-3.5.3-6.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4553" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-48976" ref_url="https://www.suse.com/security/cve/CVE-2025-48976/" source="CVE"/>
		<reference ref_id="CVE-2025-48988" ref_url="https://www.suse.com/security/cve/CVE-2025-48988/" source="CVE"/>
		<reference ref_id="CVE-2025-48989" ref_url="https://www.suse.com/security/cve/CVE-2025-48989/" source="CVE"/>
		<reference ref_id="CVE-2025-49125" ref_url="https://www.suse.com/security/cve/CVE-2025-49125/" source="CVE"/>
		<reference ref_id="CVE-2025-52434" ref_url="https://www.suse.com/security/cve/CVE-2025-52434/" source="CVE"/>
		<reference ref_id="CVE-2025-52520" ref_url="https://www.suse.com/security/cve/CVE-2025-52520/" source="CVE"/>
		<reference ref_id="CVE-2025-53506" ref_url="https://www.suse.com/security/cve/CVE-2025-53506/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14181.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14181.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48976/">CVE-2025-48976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48976">CVE-2025-48976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48988/">CVE-2025-48988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48988">CVE-2025-48988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48989/">CVE-2025-48989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48989">CVE-2025-48989 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49125/">CVE-2025-49125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49125">CVE-2025-49125 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52434/">CVE-2025-52434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52434">CVE-2025-52434 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52520/">CVE-2025-52520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52520">CVE-2025-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53506/">CVE-2025-53506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53506">CVE-2025-53506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016325" comment="tomcat-9.0.87-3.el9_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016326" comment="tomcat-admin-webapps-9.0.87-3.el9_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016327" comment="tomcat-docs-webapp-9.0.87-3.el9_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016328" comment="tomcat-el-3.0-api-9.0.87-3.el9_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016329" comment="tomcat-jsp-2.3-api-9.0.87-3.el9_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016330" comment="tomcat-lib-9.0.87-3.el9_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016331" comment="tomcat-servlet-4.0-api-9.0.87-3.el9_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016332" comment="tomcat-webapps-9.0.87-3.el9_6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4554" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-9179" ref_url="https://www.suse.com/security/cve/CVE-2025-9179/" source="CVE"/>
		<reference ref_id="CVE-2025-9180" ref_url="https://www.suse.com/security/cve/CVE-2025-9180/" source="CVE"/>
		<reference ref_id="CVE-2025-9181" ref_url="https://www.suse.com/security/cve/CVE-2025-9181/" source="CVE"/>
		<reference ref_id="CVE-2025-9182" ref_url="https://www.suse.com/security/cve/CVE-2025-9182/" source="CVE"/>
		<reference ref_id="CVE-2025-9185" ref_url="https://www.suse.com/security/cve/CVE-2025-9185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14416.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14416.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9179/">CVE-2025-9179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9179">CVE-2025-9179 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-9180/">CVE-2025-9180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9180">CVE-2025-9180 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9181/">CVE-2025-9181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9181">CVE-2025-9181 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9182/">CVE-2025-9182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9182">CVE-2025-9182 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9185/">CVE-2025-9185 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9185">CVE-2025-9185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016333" comment="firefox-128.14.0-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016334" comment="firefox-x11-128.14.0-2.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4555" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22058" ref_url="https://www.suse.com/security/cve/CVE-2025-22058/" source="CVE"/>
		<reference ref_id="CVE-2025-37914" ref_url="https://www.suse.com/security/cve/CVE-2025-37914/" source="CVE"/>
		<reference ref_id="CVE-2025-38417" ref_url="https://www.suse.com/security/cve/CVE-2025-38417/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14420.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14420.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22058/">CVE-2025-22058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22058">CVE-2025-22058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37914/">CVE-2025-37914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37914">CVE-2025-37914 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38417/">CVE-2025-38417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38417">CVE-2025-38417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015654" comment="kernel-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015655" comment="kernel-abi-stablelists-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015656" comment="kernel-core-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015657" comment="kernel-cross-headers-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015658" comment="kernel-debug-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015659" comment="kernel-debug-core-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015662" comment="kernel-debug-modules-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015663" comment="kernel-debug-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015664" comment="kernel-debug-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015665" comment="kernel-debug-uki-virt-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015668" comment="kernel-doc-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015669" comment="kernel-headers-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015670" comment="kernel-modules-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015671" comment="kernel-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015672" comment="kernel-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015673" comment="kernel-rt-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015674" comment="kernel-rt-core-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015675" comment="kernel-rt-debug-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015676" comment="kernel-rt-debug-core-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015678" comment="kernel-rt-debug-kvm-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015679" comment="kernel-rt-debug-modules-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015680" comment="kernel-rt-debug-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015681" comment="kernel-rt-debug-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015683" comment="kernel-rt-kvm-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015684" comment="kernel-rt-modules-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015685" comment="kernel-rt-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015686" comment="kernel-rt-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015687" comment="kernel-tools-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015688" comment="kernel-tools-libs-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015690" comment="kernel-uki-virt-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015691" comment="kernel-uki-virt-addons-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015692" comment="libperf-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015693" comment="perf-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015694" comment="python3-perf-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015695" comment="rtla-5.14.0-570.37.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015696" comment="rv-5.14.0-570.37.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4556" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22150" ref_url="https://www.suse.com/security/cve/CVE-2025-22150/" source="CVE"/>
		<reference ref_id="CVE-2025-23083" ref_url="https://www.suse.com/security/cve/CVE-2025-23083/" source="CVE"/>
		<reference ref_id="CVE-2025-23085" ref_url="https://www.suse.com/security/cve/CVE-2025-23085/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1443.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1443.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22150/">CVE-2025-22150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22150">CVE-2025-22150 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23083/">CVE-2025-23083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23083">CVE-2025-23083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23085/">CVE-2025-23085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23085">CVE-2025-23085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963846" comment="nodejs-20.18.2-1.module+el9.5.0+22758+4ad2c198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963847" comment="nodejs-devel-20.18.2-1.module+el9.5.0+22758+4ad2c198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963848" comment="nodejs-docs-20.18.2-1.module+el9.5.0+22758+4ad2c198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963849" comment="nodejs-full-i18n-20.18.2-1.module+el9.5.0+22758+4ad2c198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963850" comment="npm-10.8.2-1.20.18.2.1.module+el9.5.0+22758+4ad2c198 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4557" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22150" ref_url="https://www.suse.com/security/cve/CVE-2025-22150/" source="CVE"/>
		<reference ref_id="CVE-2025-23085" ref_url="https://www.suse.com/security/cve/CVE-2025-23085/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1446.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1446.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22150/">CVE-2025-22150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22150">CVE-2025-22150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23085/">CVE-2025-23085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23085">CVE-2025-23085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963851" comment="nodejs-18.20.6-1.module+el9.5.0+22773+9a359385 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963852" comment="nodejs-devel-18.20.6-1.module+el9.5.0+22773+9a359385 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963853" comment="nodejs-docs-18.20.6-1.module+el9.5.0+22773+9a359385 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963854" comment="nodejs-full-i18n-18.20.6-1.module+el9.5.0+22773+9a359385 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963855" comment="nodejs-nodemon-3.0.1-1.module+el9.5.0+22773+9a359385 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963856" comment="nodejs-packaging-2021.06-4.module+el9.5.0+22773+9a359385 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963857" comment="nodejs-packaging-bundler-2021.06-4.module+el9.5.0+22773+9a359385 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963858" comment="npm-10.8.2-1.18.20.6.1.module+el9.5.0+22773+9a359385 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4558" version="1" class="patch">
	<metadata>
		<title>security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-54389" ref_url="https://www.suse.com/security/cve/CVE-2025-54389/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14493.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14493.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54389/">CVE-2025-54389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54389">CVE-2025-54389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015590" comment="aide-0.16-103.el9_6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4559" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-9179" ref_url="https://www.suse.com/security/cve/CVE-2025-9179/" source="CVE"/>
		<reference ref_id="CVE-2025-9180" ref_url="https://www.suse.com/security/cve/CVE-2025-9180/" source="CVE"/>
		<reference ref_id="CVE-2025-9181" ref_url="https://www.suse.com/security/cve/CVE-2025-9181/" source="CVE"/>
		<reference ref_id="CVE-2025-9182" ref_url="https://www.suse.com/security/cve/CVE-2025-9182/" source="CVE"/>
		<reference ref_id="CVE-2025-9185" ref_url="https://www.suse.com/security/cve/CVE-2025-9185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14640.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14640.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9179/">CVE-2025-9179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9179">CVE-2025-9179 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-9180/">CVE-2025-9180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9180">CVE-2025-9180 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9181/">CVE-2025-9181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9181">CVE-2025-9181 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9182/">CVE-2025-9182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9182">CVE-2025-9182 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9185/">CVE-2025-9185 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9185">CVE-2025-9185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016097" comment="thunderbird-128.14.0-3.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4560" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<reference ref_id="CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14827.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14827.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016335" comment="pg_repack-1.5.1-1.module+el9.6.0+22880+6b241eec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016336" comment="pgvector-0.6.2-2.module+el9.6.0+22979+c3d78d52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016337" comment="postgresql-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016338" comment="postgresql-contrib-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016339" comment="postgresql-docs-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016340" comment="postgresql-plperl-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016341" comment="postgresql-plpython3-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016342" comment="postgresql-pltcl-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016343" comment="postgresql-private-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016344" comment="postgresql-private-libs-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016345" comment="postgresql-server-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016346" comment="postgresql-server-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016347" comment="postgresql-static-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016348" comment="postgresql-test-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016349" comment="postgresql-test-rpm-macros-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016350" comment="postgresql-upgrade-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016351" comment="postgresql-upgrade-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4561" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<reference ref_id="CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14862.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14862.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053988" comment="pg_repack-1.4.8-2.module+el9.5.0+22224+f5585c78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053989" comment="postgresql-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053990" comment="postgresql-contrib-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053991" comment="postgresql-docs-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053992" comment="postgresql-plperl-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053993" comment="postgresql-plpython3-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053994" comment="postgresql-pltcl-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053995" comment="postgresql-private-devel-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053996" comment="postgresql-private-libs-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053997" comment="postgresql-server-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053998" comment="postgresql-server-devel-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053999" comment="postgresql-static-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054000" comment="postgresql-test-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054001" comment="postgresql-test-rpm-macros-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054002" comment="postgresql-upgrade-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054003" comment="postgresql-upgrade-devel-15.14-1.module+el9.6.0+23419+7863ab62 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4562" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14878.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14878.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016352" comment="postgresql-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016353" comment="postgresql-contrib-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016354" comment="postgresql-docs-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016355" comment="postgresql-plperl-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016356" comment="postgresql-plpython3-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016357" comment="postgresql-pltcl-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016358" comment="postgresql-private-devel-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016359" comment="postgresql-private-libs-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016360" comment="postgresql-server-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016361" comment="postgresql-server-devel-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016362" comment="postgresql-static-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016363" comment="postgresql-test-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016364" comment="postgresql-test-rpm-macros-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016365" comment="postgresql-upgrade-13.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016366" comment="postgresql-upgrade-devel-13.22-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4563" version="1" class="patch">
	<metadata>
		<title>security update for mod_http2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-49630" ref_url="https://www.suse.com/security/cve/CVE-2025-49630/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14983.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14983.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49630/">CVE-2025-49630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49630">CVE-2025-49630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016866" comment="mod_http2-2.0.26-4.el9_6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4564" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15007.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15007.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017003" comment="python3.12-3.12.9-1.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017004" comment="python3.12-debug-3.12.9-1.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017005" comment="python3.12-devel-3.12.9-1.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017006" comment="python3.12-idle-3.12.9-1.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017007" comment="python3.12-libs-3.12.9-1.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017008" comment="python3.12-test-3.12.9-1.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017009" comment="python3.12-tkinter-3.12.9-1.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4565" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15010.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15010.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017010" comment="python3.11-3.11.11-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017011" comment="python3.11-debug-3.11.11-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017012" comment="python3.11-devel-3.11.11-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017013" comment="python3.11-idle-3.11.11-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017014" comment="python3.11-libs-3.11.11-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017015" comment="python3.11-test-3.11.11-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017016" comment="python3.11-tkinter-3.11.11-2.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4566" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-37823" ref_url="https://www.suse.com/security/cve/CVE-2025-37823/" source="CVE"/>
		<reference ref_id="CVE-2025-38200" ref_url="https://www.suse.com/security/cve/CVE-2025-38200/" source="CVE"/>
		<reference ref_id="CVE-2025-38211" ref_url="https://www.suse.com/security/cve/CVE-2025-38211/" source="CVE"/>
		<reference ref_id="CVE-2025-38350" ref_url="https://www.suse.com/security/cve/CVE-2025-38350/" source="CVE"/>
		<reference ref_id="CVE-2025-38461" ref_url="https://www.suse.com/security/cve/CVE-2025-38461/" source="CVE"/>
		<reference ref_id="CVE-2025-38464" ref_url="https://www.suse.com/security/cve/CVE-2025-38464/" source="CVE"/>
		<reference ref_id="CVE-2025-38500" ref_url="https://www.suse.com/security/cve/CVE-2025-38500/" source="CVE"/>
		<reference ref_id="CVE-2025-38684" ref_url="https://www.suse.com/security/cve/CVE-2025-38684/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15011.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15011.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37823/">CVE-2025-37823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38200/">CVE-2025-38200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38211/">CVE-2025-38211 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38211">CVE-2025-38211 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38350/">CVE-2025-38350 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38461/">CVE-2025-38461 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38461">CVE-2025-38461 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38464/">CVE-2025-38464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38464">CVE-2025-38464 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38500/">CVE-2025-38500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38500">CVE-2025-38500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38684/">CVE-2025-38684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017120" comment="kernel-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017121" comment="kernel-abi-stablelists-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017122" comment="kernel-core-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017123" comment="kernel-cross-headers-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017124" comment="kernel-debug-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017125" comment="kernel-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017128" comment="kernel-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017129" comment="kernel-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017130" comment="kernel-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017131" comment="kernel-debug-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017134" comment="kernel-doc-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017135" comment="kernel-headers-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017136" comment="kernel-modules-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017137" comment="kernel-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017138" comment="kernel-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017139" comment="kernel-rt-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017140" comment="kernel-rt-core-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017141" comment="kernel-rt-debug-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017142" comment="kernel-rt-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017144" comment="kernel-rt-debug-kvm-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017145" comment="kernel-rt-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017146" comment="kernel-rt-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017147" comment="kernel-rt-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017149" comment="kernel-rt-kvm-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017150" comment="kernel-rt-modules-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017151" comment="kernel-rt-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017152" comment="kernel-rt-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017153" comment="kernel-tools-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017154" comment="kernel-tools-libs-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017156" comment="kernel-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017157" comment="kernel-uki-virt-addons-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017158" comment="libperf-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017159" comment="perf-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017160" comment="python3-perf-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017161" comment="rtla-5.14.0-570.39.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017162" comment="rv-5.14.0-570.39.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4567" version="1" class="patch">
	<metadata>
		<title>security update for udisks2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-8067" ref_url="https://www.suse.com/security/cve/CVE-2025-8067/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15018.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15018.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-8067/">CVE-2025-8067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8067">CVE-2025-8067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017017" comment="libudisks2-2.9.4-11.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017018" comment="libudisks2-devel-2.9.4-11.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017019" comment="udisks2-2.9.4-11.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017020" comment="udisks2-iscsi-2.9.4-11.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017021" comment="udisks2-lsm-2.9.4-11.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017022" comment="udisks2-lvm2-2.9.4-11.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4568" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15019.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15019.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017023" comment="python-unversioned-command-3.9.21-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017024" comment="python3-3.9.21-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017025" comment="python3-debug-3.9.21-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017026" comment="python3-devel-3.9.21-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017027" comment="python3-idle-3.9.21-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017028" comment="python3-libs-3.9.21-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017029" comment="python3-test-3.9.21-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017030" comment="python3-tkinter-3.9.21-2.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4569" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-47252" ref_url="https://www.suse.com/security/cve/CVE-2024-47252/" source="CVE"/>
		<reference ref_id="CVE-2025-23048" ref_url="https://www.suse.com/security/cve/CVE-2025-23048/" source="CVE"/>
		<reference ref_id="CVE-2025-49812" ref_url="https://www.suse.com/security/cve/CVE-2025-49812/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15023.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15023.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47252/">CVE-2024-47252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47252">CVE-2024-47252 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23048/">CVE-2025-23048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23048">CVE-2025-23048 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49812/">CVE-2025-49812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49812">CVE-2025-49812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017031" comment="httpd-2.4.62-4.el9_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017032" comment="httpd-core-2.4.62-4.el9_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017033" comment="httpd-devel-2.4.62-4.el9_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017034" comment="httpd-filesystem-2.4.62-4.el9_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017035" comment="httpd-manual-2.4.62-4.el9_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017036" comment="httpd-tools-2.4.62-4.el9_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017037" comment="mod_ldap-2.4.62-4.el9_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017038" comment="mod_lua-2.4.62-4.el9_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017039" comment="mod_proxy_html-2.4.62-4.el9_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017040" comment="mod_session-2.4.62-4.el9_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017041" comment="mod_ssl-2.4.62-4.el9_6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4570" version="1" class="patch">
	<metadata>
		<title>security update for pam (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-6020" ref_url="https://www.suse.com/security/cve/CVE-2025-6020/" source="CVE"/>
		<reference ref_id="CVE-2025-8941" ref_url="https://www.suse.com/security/cve/CVE-2025-8941/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15099.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15099.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6020/">CVE-2025-6020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6020">CVE-2025-6020 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8941/">CVE-2025-8941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8941">CVE-2025-8941 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016906" comment="pam-1.5.1-26.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016907" comment="pam-devel-1.5.1-26.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016908" comment="pam-docs-1.5.1-26.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4571" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-37803" ref_url="https://www.suse.com/security/cve/CVE-2025-37803/" source="CVE"/>
		<reference ref_id="CVE-2025-38392" ref_url="https://www.suse.com/security/cve/CVE-2025-38392/" source="CVE"/>
		<reference ref_id="CVE-2025-39825" ref_url="https://www.suse.com/security/cve/CVE-2025-39825/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15429.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15429.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37803/">CVE-2025-37803 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37803">CVE-2025-37803 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38392/">CVE-2025-38392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38392">CVE-2025-38392 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39825/">CVE-2025-39825 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39825">CVE-2025-39825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017422" comment="kernel-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017423" comment="kernel-abi-stablelists-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017424" comment="kernel-core-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017425" comment="kernel-cross-headers-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017426" comment="kernel-debug-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017427" comment="kernel-debug-core-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017430" comment="kernel-debug-modules-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017431" comment="kernel-debug-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017432" comment="kernel-debug-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017433" comment="kernel-debug-uki-virt-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017436" comment="kernel-doc-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017437" comment="kernel-headers-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017438" comment="kernel-modules-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017439" comment="kernel-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017440" comment="kernel-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017441" comment="kernel-rt-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017442" comment="kernel-rt-core-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017443" comment="kernel-rt-debug-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017444" comment="kernel-rt-debug-core-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017446" comment="kernel-rt-debug-kvm-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017447" comment="kernel-rt-debug-modules-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017448" comment="kernel-rt-debug-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017449" comment="kernel-rt-debug-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017451" comment="kernel-rt-kvm-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017452" comment="kernel-rt-modules-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017453" comment="kernel-rt-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017454" comment="kernel-rt-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017455" comment="kernel-tools-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017456" comment="kernel-tools-libs-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017458" comment="kernel-uki-virt-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017459" comment="kernel-uki-virt-addons-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017460" comment="libperf-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017461" comment="perf-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017462" comment="python3-perf-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017463" comment="rtla-5.14.0-570.41.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017464" comment="rv-5.14.0-570.41.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4572" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-26130" ref_url="https://www.suse.com/security/cve/CVE-2024-26130/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15608.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15608.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26130/">CVE-2024-26130 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26130">CVE-2024-26130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017700" comment="python3.12-cryptography-41.0.7-2.el9_6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4573" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22097" ref_url="https://www.suse.com/security/cve/CVE-2025-22097/" source="CVE"/>
		<reference ref_id="CVE-2025-38332" ref_url="https://www.suse.com/security/cve/CVE-2025-38332/" source="CVE"/>
		<reference ref_id="CVE-2025-38352" ref_url="https://www.suse.com/security/cve/CVE-2025-38352/" source="CVE"/>
		<reference ref_id="CVE-2025-38449" ref_url="https://www.suse.com/security/cve/CVE-2025-38449/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15661.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15661.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22097/">CVE-2025-22097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22097">CVE-2025-22097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38332/">CVE-2025-38332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38332">CVE-2025-38332 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38352/">CVE-2025-38352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38449/">CVE-2025-38449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38449">CVE-2025-38449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017875" comment="kernel-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017876" comment="kernel-abi-stablelists-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017877" comment="kernel-core-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017878" comment="kernel-cross-headers-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017879" comment="kernel-debug-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017880" comment="kernel-debug-core-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017883" comment="kernel-debug-modules-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017884" comment="kernel-debug-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017885" comment="kernel-debug-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017886" comment="kernel-debug-uki-virt-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017889" comment="kernel-doc-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017890" comment="kernel-headers-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017891" comment="kernel-modules-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017892" comment="kernel-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017893" comment="kernel-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017894" comment="kernel-rt-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017895" comment="kernel-rt-core-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017896" comment="kernel-rt-debug-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017897" comment="kernel-rt-debug-core-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017899" comment="kernel-rt-debug-kvm-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017900" comment="kernel-rt-debug-modules-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017901" comment="kernel-rt-debug-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017902" comment="kernel-rt-debug-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017904" comment="kernel-rt-kvm-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017905" comment="kernel-rt-modules-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017906" comment="kernel-rt-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017907" comment="kernel-rt-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017908" comment="kernel-tools-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017909" comment="kernel-tools-libs-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017911" comment="kernel-uki-virt-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017912" comment="kernel-uki-virt-addons-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017913" comment="libperf-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017914" comment="perf-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017915" comment="python3-perf-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017916" comment="rtla-5.14.0-570.42.2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017917" comment="rv-5.14.0-570.42.2.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4574" version="1" class="patch">
	<metadata>
		<title>security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-58060" ref_url="https://www.suse.com/security/cve/CVE-2025-58060/" source="CVE"/>
		<reference ref_id="CVE-2025-58364" ref_url="https://www.suse.com/security/cve/CVE-2025-58364/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15700.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15700.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58060/">CVE-2025-58060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58060">CVE-2025-58060 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-58364/">CVE-2025-58364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58364">CVE-2025-58364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018057" comment="cups-2.3.3op2-33.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018058" comment="cups-client-2.3.3op2-33.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018059" comment="cups-devel-2.3.3op2-33.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018060" comment="cups-filesystem-2.3.3op2-33.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018061" comment="cups-ipptool-2.3.3op2-33.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018062" comment="cups-libs-2.3.3op2-33.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018063" comment="cups-lpd-2.3.3op2-33.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018064" comment="cups-printerapp-2.3.3op2-33.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4575" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-38550" ref_url="https://www.suse.com/security/cve/CVE-2025-38550/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15740.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15740.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38550/">CVE-2025-38550 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38550">CVE-2025-38550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018240" comment="kernel-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018241" comment="kernel-abi-stablelists-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018242" comment="kernel-core-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018243" comment="kernel-cross-headers-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018244" comment="kernel-debug-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018245" comment="kernel-debug-core-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018248" comment="kernel-debug-modules-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018249" comment="kernel-debug-modules-core-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018250" comment="kernel-debug-modules-extra-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018251" comment="kernel-debug-uki-virt-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018254" comment="kernel-doc-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018255" comment="kernel-headers-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018256" comment="kernel-modules-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018257" comment="kernel-modules-core-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018258" comment="kernel-modules-extra-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018259" comment="kernel-rt-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018260" comment="kernel-rt-core-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018261" comment="kernel-rt-debug-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018262" comment="kernel-rt-debug-core-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018264" comment="kernel-rt-debug-kvm-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018265" comment="kernel-rt-debug-modules-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018266" comment="kernel-rt-debug-modules-core-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018267" comment="kernel-rt-debug-modules-extra-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018269" comment="kernel-rt-kvm-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018270" comment="kernel-rt-modules-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018271" comment="kernel-rt-modules-core-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018272" comment="kernel-rt-modules-extra-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018273" comment="kernel-tools-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018274" comment="kernel-tools-libs-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018276" comment="kernel-uki-virt-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018277" comment="kernel-uki-virt-addons-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018278" comment="libperf-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018279" comment="perf-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018280" comment="python3-perf-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018281" comment="rtla-5.14.0-570.44.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018282" comment="rv-5.14.0-570.44.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4576" version="1" class="patch">
	<metadata>
		<title>security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-49083" ref_url="https://www.suse.com/security/cve/CVE-2023-49083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15874.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15874.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49083/">CVE-2023-49083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018283" comment="python3-cryptography-36.0.1-5.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4577" version="1" class="patch">
	<metadata>
		<title>security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-9566" ref_url="https://www.suse.com/security/cve/CVE-2025-9566/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15900.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15900.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9566/">CVE-2025-9566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9566">CVE-2025-9566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018321" comment="podman-5.4.0-13.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018322" comment="podman-docker-5.4.0-13.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018323" comment="podman-plugins-5.4.0-13.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018324" comment="podman-remote-5.4.0-13.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018325" comment="podman-tests-5.4.0-13.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4578" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21574" ref_url="https://www.suse.com/security/cve/CVE-2025-21574/" source="CVE"/>
		<reference ref_id="CVE-2025-21575" ref_url="https://www.suse.com/security/cve/CVE-2025-21575/" source="CVE"/>
		<reference ref_id="CVE-2025-21577" ref_url="https://www.suse.com/security/cve/CVE-2025-21577/" source="CVE"/>
		<reference ref_id="CVE-2025-21579" ref_url="https://www.suse.com/security/cve/CVE-2025-21579/" source="CVE"/>
		<reference ref_id="CVE-2025-21580" ref_url="https://www.suse.com/security/cve/CVE-2025-21580/" source="CVE"/>
		<reference ref_id="CVE-2025-21581" ref_url="https://www.suse.com/security/cve/CVE-2025-21581/" source="CVE"/>
		<reference ref_id="CVE-2025-21584" ref_url="https://www.suse.com/security/cve/CVE-2025-21584/" source="CVE"/>
		<reference ref_id="CVE-2025-21585" ref_url="https://www.suse.com/security/cve/CVE-2025-21585/" source="CVE"/>
		<reference ref_id="CVE-2025-21588" ref_url="https://www.suse.com/security/cve/CVE-2025-21588/" source="CVE"/>
		<reference ref_id="CVE-2025-30681" ref_url="https://www.suse.com/security/cve/CVE-2025-30681/" source="CVE"/>
		<reference ref_id="CVE-2025-30682" ref_url="https://www.suse.com/security/cve/CVE-2025-30682/" source="CVE"/>
		<reference ref_id="CVE-2025-30683" ref_url="https://www.suse.com/security/cve/CVE-2025-30683/" source="CVE"/>
		<reference ref_id="CVE-2025-30684" ref_url="https://www.suse.com/security/cve/CVE-2025-30684/" source="CVE"/>
		<reference ref_id="CVE-2025-30685" ref_url="https://www.suse.com/security/cve/CVE-2025-30685/" source="CVE"/>
		<reference ref_id="CVE-2025-30687" ref_url="https://www.suse.com/security/cve/CVE-2025-30687/" source="CVE"/>
		<reference ref_id="CVE-2025-30688" ref_url="https://www.suse.com/security/cve/CVE-2025-30688/" source="CVE"/>
		<reference ref_id="CVE-2025-30689" ref_url="https://www.suse.com/security/cve/CVE-2025-30689/" source="CVE"/>
		<reference ref_id="CVE-2025-30693" ref_url="https://www.suse.com/security/cve/CVE-2025-30693/" source="CVE"/>
		<reference ref_id="CVE-2025-30695" ref_url="https://www.suse.com/security/cve/CVE-2025-30695/" source="CVE"/>
		<reference ref_id="CVE-2025-30696" ref_url="https://www.suse.com/security/cve/CVE-2025-30696/" source="CVE"/>
		<reference ref_id="CVE-2025-30699" ref_url="https://www.suse.com/security/cve/CVE-2025-30699/" source="CVE"/>
		<reference ref_id="CVE-2025-30703" ref_url="https://www.suse.com/security/cve/CVE-2025-30703/" source="CVE"/>
		<reference ref_id="CVE-2025-30704" ref_url="https://www.suse.com/security/cve/CVE-2025-30704/" source="CVE"/>
		<reference ref_id="CVE-2025-30705" ref_url="https://www.suse.com/security/cve/CVE-2025-30705/" source="CVE"/>
		<reference ref_id="CVE-2025-30715" ref_url="https://www.suse.com/security/cve/CVE-2025-30715/" source="CVE"/>
		<reference ref_id="CVE-2025-30721" ref_url="https://www.suse.com/security/cve/CVE-2025-30721/" source="CVE"/>
		<reference ref_id="CVE-2025-30722" ref_url="https://www.suse.com/security/cve/CVE-2025-30722/" source="CVE"/>
		<reference ref_id="CVE-2025-50077" ref_url="https://www.suse.com/security/cve/CVE-2025-50077/" source="CVE"/>
		<reference ref_id="CVE-2025-50078" ref_url="https://www.suse.com/security/cve/CVE-2025-50078/" source="CVE"/>
		<reference ref_id="CVE-2025-50079" ref_url="https://www.suse.com/security/cve/CVE-2025-50079/" source="CVE"/>
		<reference ref_id="CVE-2025-50080" ref_url="https://www.suse.com/security/cve/CVE-2025-50080/" source="CVE"/>
		<reference ref_id="CVE-2025-50081" ref_url="https://www.suse.com/security/cve/CVE-2025-50081/" source="CVE"/>
		<reference ref_id="CVE-2025-50082" ref_url="https://www.suse.com/security/cve/CVE-2025-50082/" source="CVE"/>
		<reference ref_id="CVE-2025-50083" ref_url="https://www.suse.com/security/cve/CVE-2025-50083/" source="CVE"/>
		<reference ref_id="CVE-2025-50084" ref_url="https://www.suse.com/security/cve/CVE-2025-50084/" source="CVE"/>
		<reference ref_id="CVE-2025-50085" ref_url="https://www.suse.com/security/cve/CVE-2025-50085/" source="CVE"/>
		<reference ref_id="CVE-2025-50086" ref_url="https://www.suse.com/security/cve/CVE-2025-50086/" source="CVE"/>
		<reference ref_id="CVE-2025-50087" ref_url="https://www.suse.com/security/cve/CVE-2025-50087/" source="CVE"/>
		<reference ref_id="CVE-2025-50088" ref_url="https://www.suse.com/security/cve/CVE-2025-50088/" source="CVE"/>
		<reference ref_id="CVE-2025-50091" ref_url="https://www.suse.com/security/cve/CVE-2025-50091/" source="CVE"/>
		<reference ref_id="CVE-2025-50092" ref_url="https://www.suse.com/security/cve/CVE-2025-50092/" source="CVE"/>
		<reference ref_id="CVE-2025-50093" ref_url="https://www.suse.com/security/cve/CVE-2025-50093/" source="CVE"/>
		<reference ref_id="CVE-2025-50094" ref_url="https://www.suse.com/security/cve/CVE-2025-50094/" source="CVE"/>
		<reference ref_id="CVE-2025-50096" ref_url="https://www.suse.com/security/cve/CVE-2025-50096/" source="CVE"/>
		<reference ref_id="CVE-2025-50097" ref_url="https://www.suse.com/security/cve/CVE-2025-50097/" source="CVE"/>
		<reference ref_id="CVE-2025-50098" ref_url="https://www.suse.com/security/cve/CVE-2025-50098/" source="CVE"/>
		<reference ref_id="CVE-2025-50099" ref_url="https://www.suse.com/security/cve/CVE-2025-50099/" source="CVE"/>
		<reference ref_id="CVE-2025-50100" ref_url="https://www.suse.com/security/cve/CVE-2025-50100/" source="CVE"/>
		<reference ref_id="CVE-2025-50101" ref_url="https://www.suse.com/security/cve/CVE-2025-50101/" source="CVE"/>
		<reference ref_id="CVE-2025-50102" ref_url="https://www.suse.com/security/cve/CVE-2025-50102/" source="CVE"/>
		<reference ref_id="CVE-2025-50104" ref_url="https://www.suse.com/security/cve/CVE-2025-50104/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16046.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16046.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21574/">CVE-2025-21574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21574">CVE-2025-21574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21575/">CVE-2025-21575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21575">CVE-2025-21575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21577/">CVE-2025-21577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21577">CVE-2025-21577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21579/">CVE-2025-21579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21579">CVE-2025-21579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21580/">CVE-2025-21580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21580">CVE-2025-21580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21581/">CVE-2025-21581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21581">CVE-2025-21581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21584/">CVE-2025-21584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21584">CVE-2025-21584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21585/">CVE-2025-21585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21585">CVE-2025-21585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21588/">CVE-2025-21588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21588">CVE-2025-21588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30681/">CVE-2025-30681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30681">CVE-2025-30681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30682/">CVE-2025-30682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30682">CVE-2025-30682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30683/">CVE-2025-30683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30683">CVE-2025-30683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30684/">CVE-2025-30684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30684">CVE-2025-30684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30685/">CVE-2025-30685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30685">CVE-2025-30685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30687/">CVE-2025-30687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30687">CVE-2025-30687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30688/">CVE-2025-30688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30688">CVE-2025-30688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30689/">CVE-2025-30689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30689">CVE-2025-30689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-30693/">CVE-2025-30693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30693">CVE-2025-30693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30695/">CVE-2025-30695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30695">CVE-2025-30695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30696/">CVE-2025-30696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30696">CVE-2025-30696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30699/">CVE-2025-30699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30699">CVE-2025-30699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30703/">CVE-2025-30703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30703">CVE-2025-30703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30704/">CVE-2025-30704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30704">CVE-2025-30704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30705/">CVE-2025-30705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30705">CVE-2025-30705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30715/">CVE-2025-30715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30715">CVE-2025-30715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30721/">CVE-2025-30721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30721">CVE-2025-30721 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30722/">CVE-2025-30722 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30722">CVE-2025-30722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50077/">CVE-2025-50077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50077">CVE-2025-50077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50078/">CVE-2025-50078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50078">CVE-2025-50078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50079/">CVE-2025-50079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50079">CVE-2025-50079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50080/">CVE-2025-50080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50080">CVE-2025-50080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50081/">CVE-2025-50081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50081">CVE-2025-50081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50082/">CVE-2025-50082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50082">CVE-2025-50082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50083/">CVE-2025-50083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50083">CVE-2025-50083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50084/">CVE-2025-50084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50084">CVE-2025-50084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50085/">CVE-2025-50085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50085">CVE-2025-50085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50086/">CVE-2025-50086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50086">CVE-2025-50086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50087/">CVE-2025-50087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50087">CVE-2025-50087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50088/">CVE-2025-50088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50088">CVE-2025-50088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50091/">CVE-2025-50091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50091">CVE-2025-50091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50092/">CVE-2025-50092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50092">CVE-2025-50092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50093/">CVE-2025-50093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50093">CVE-2025-50093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50094/">CVE-2025-50094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50094">CVE-2025-50094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50096/">CVE-2025-50096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50096">CVE-2025-50096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50097/">CVE-2025-50097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50097">CVE-2025-50097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50098/">CVE-2025-50098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50098">CVE-2025-50098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50099/">CVE-2025-50099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50099">CVE-2025-50099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50100/">CVE-2025-50100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50100">CVE-2025-50100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50101/">CVE-2025-50101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50101">CVE-2025-50101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50102/">CVE-2025-50102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50102">CVE-2025-50102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50104/">CVE-2025-50104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50104">CVE-2025-50104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4579" version="1" class="patch">
	<metadata>
		<title>security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21574" ref_url="https://www.suse.com/security/cve/CVE-2025-21574/" source="CVE"/>
		<reference ref_id="CVE-2025-21575" ref_url="https://www.suse.com/security/cve/CVE-2025-21575/" source="CVE"/>
		<reference ref_id="CVE-2025-21577" ref_url="https://www.suse.com/security/cve/CVE-2025-21577/" source="CVE"/>
		<reference ref_id="CVE-2025-21579" ref_url="https://www.suse.com/security/cve/CVE-2025-21579/" source="CVE"/>
		<reference ref_id="CVE-2025-21580" ref_url="https://www.suse.com/security/cve/CVE-2025-21580/" source="CVE"/>
		<reference ref_id="CVE-2025-21581" ref_url="https://www.suse.com/security/cve/CVE-2025-21581/" source="CVE"/>
		<reference ref_id="CVE-2025-21584" ref_url="https://www.suse.com/security/cve/CVE-2025-21584/" source="CVE"/>
		<reference ref_id="CVE-2025-21585" ref_url="https://www.suse.com/security/cve/CVE-2025-21585/" source="CVE"/>
		<reference ref_id="CVE-2025-30681" ref_url="https://www.suse.com/security/cve/CVE-2025-30681/" source="CVE"/>
		<reference ref_id="CVE-2025-30682" ref_url="https://www.suse.com/security/cve/CVE-2025-30682/" source="CVE"/>
		<reference ref_id="CVE-2025-30683" ref_url="https://www.suse.com/security/cve/CVE-2025-30683/" source="CVE"/>
		<reference ref_id="CVE-2025-30684" ref_url="https://www.suse.com/security/cve/CVE-2025-30684/" source="CVE"/>
		<reference ref_id="CVE-2025-30685" ref_url="https://www.suse.com/security/cve/CVE-2025-30685/" source="CVE"/>
		<reference ref_id="CVE-2025-30687" ref_url="https://www.suse.com/security/cve/CVE-2025-30687/" source="CVE"/>
		<reference ref_id="CVE-2025-30688" ref_url="https://www.suse.com/security/cve/CVE-2025-30688/" source="CVE"/>
		<reference ref_id="CVE-2025-30689" ref_url="https://www.suse.com/security/cve/CVE-2025-30689/" source="CVE"/>
		<reference ref_id="CVE-2025-30693" ref_url="https://www.suse.com/security/cve/CVE-2025-30693/" source="CVE"/>
		<reference ref_id="CVE-2025-30695" ref_url="https://www.suse.com/security/cve/CVE-2025-30695/" source="CVE"/>
		<reference ref_id="CVE-2025-30696" ref_url="https://www.suse.com/security/cve/CVE-2025-30696/" source="CVE"/>
		<reference ref_id="CVE-2025-30699" ref_url="https://www.suse.com/security/cve/CVE-2025-30699/" source="CVE"/>
		<reference ref_id="CVE-2025-30703" ref_url="https://www.suse.com/security/cve/CVE-2025-30703/" source="CVE"/>
		<reference ref_id="CVE-2025-30704" ref_url="https://www.suse.com/security/cve/CVE-2025-30704/" source="CVE"/>
		<reference ref_id="CVE-2025-30705" ref_url="https://www.suse.com/security/cve/CVE-2025-30705/" source="CVE"/>
		<reference ref_id="CVE-2025-30715" ref_url="https://www.suse.com/security/cve/CVE-2025-30715/" source="CVE"/>
		<reference ref_id="CVE-2025-30721" ref_url="https://www.suse.com/security/cve/CVE-2025-30721/" source="CVE"/>
		<reference ref_id="CVE-2025-30722" ref_url="https://www.suse.com/security/cve/CVE-2025-30722/" source="CVE"/>
		<reference ref_id="CVE-2025-50077" ref_url="https://www.suse.com/security/cve/CVE-2025-50077/" source="CVE"/>
		<reference ref_id="CVE-2025-50078" ref_url="https://www.suse.com/security/cve/CVE-2025-50078/" source="CVE"/>
		<reference ref_id="CVE-2025-50079" ref_url="https://www.suse.com/security/cve/CVE-2025-50079/" source="CVE"/>
		<reference ref_id="CVE-2025-50080" ref_url="https://www.suse.com/security/cve/CVE-2025-50080/" source="CVE"/>
		<reference ref_id="CVE-2025-50081" ref_url="https://www.suse.com/security/cve/CVE-2025-50081/" source="CVE"/>
		<reference ref_id="CVE-2025-50082" ref_url="https://www.suse.com/security/cve/CVE-2025-50082/" source="CVE"/>
		<reference ref_id="CVE-2025-50083" ref_url="https://www.suse.com/security/cve/CVE-2025-50083/" source="CVE"/>
		<reference ref_id="CVE-2025-50084" ref_url="https://www.suse.com/security/cve/CVE-2025-50084/" source="CVE"/>
		<reference ref_id="CVE-2025-50085" ref_url="https://www.suse.com/security/cve/CVE-2025-50085/" source="CVE"/>
		<reference ref_id="CVE-2025-50086" ref_url="https://www.suse.com/security/cve/CVE-2025-50086/" source="CVE"/>
		<reference ref_id="CVE-2025-50087" ref_url="https://www.suse.com/security/cve/CVE-2025-50087/" source="CVE"/>
		<reference ref_id="CVE-2025-50088" ref_url="https://www.suse.com/security/cve/CVE-2025-50088/" source="CVE"/>
		<reference ref_id="CVE-2025-50091" ref_url="https://www.suse.com/security/cve/CVE-2025-50091/" source="CVE"/>
		<reference ref_id="CVE-2025-50092" ref_url="https://www.suse.com/security/cve/CVE-2025-50092/" source="CVE"/>
		<reference ref_id="CVE-2025-50093" ref_url="https://www.suse.com/security/cve/CVE-2025-50093/" source="CVE"/>
		<reference ref_id="CVE-2025-50094" ref_url="https://www.suse.com/security/cve/CVE-2025-50094/" source="CVE"/>
		<reference ref_id="CVE-2025-50096" ref_url="https://www.suse.com/security/cve/CVE-2025-50096/" source="CVE"/>
		<reference ref_id="CVE-2025-50097" ref_url="https://www.suse.com/security/cve/CVE-2025-50097/" source="CVE"/>
		<reference ref_id="CVE-2025-50098" ref_url="https://www.suse.com/security/cve/CVE-2025-50098/" source="CVE"/>
		<reference ref_id="CVE-2025-50099" ref_url="https://www.suse.com/security/cve/CVE-2025-50099/" source="CVE"/>
		<reference ref_id="CVE-2025-50100" ref_url="https://www.suse.com/security/cve/CVE-2025-50100/" source="CVE"/>
		<reference ref_id="CVE-2025-50101" ref_url="https://www.suse.com/security/cve/CVE-2025-50101/" source="CVE"/>
		<reference ref_id="CVE-2025-50102" ref_url="https://www.suse.com/security/cve/CVE-2025-50102/" source="CVE"/>
		<reference ref_id="CVE-2025-50104" ref_url="https://www.suse.com/security/cve/CVE-2025-50104/" source="CVE"/>
		<reference ref_id="CVE-2025-53023" ref_url="https://www.suse.com/security/cve/CVE-2025-53023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16086.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16086.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21574/">CVE-2025-21574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21574">CVE-2025-21574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21575/">CVE-2025-21575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21575">CVE-2025-21575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21577/">CVE-2025-21577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21577">CVE-2025-21577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21579/">CVE-2025-21579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21579">CVE-2025-21579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21580/">CVE-2025-21580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21580">CVE-2025-21580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21581/">CVE-2025-21581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21581">CVE-2025-21581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21584/">CVE-2025-21584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21584">CVE-2025-21584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21585/">CVE-2025-21585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21585">CVE-2025-21585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30681/">CVE-2025-30681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30681">CVE-2025-30681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30682/">CVE-2025-30682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30682">CVE-2025-30682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30683/">CVE-2025-30683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30683">CVE-2025-30683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30684/">CVE-2025-30684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30684">CVE-2025-30684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30685/">CVE-2025-30685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30685">CVE-2025-30685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30687/">CVE-2025-30687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30687">CVE-2025-30687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30688/">CVE-2025-30688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30688">CVE-2025-30688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30689/">CVE-2025-30689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30689">CVE-2025-30689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-30693/">CVE-2025-30693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30693">CVE-2025-30693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30695/">CVE-2025-30695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30695">CVE-2025-30695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30696/">CVE-2025-30696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30696">CVE-2025-30696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30699/">CVE-2025-30699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30699">CVE-2025-30699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30703/">CVE-2025-30703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30703">CVE-2025-30703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30704/">CVE-2025-30704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30704">CVE-2025-30704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30705/">CVE-2025-30705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30705">CVE-2025-30705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30715/">CVE-2025-30715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30715">CVE-2025-30715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30721/">CVE-2025-30721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30721">CVE-2025-30721 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30722/">CVE-2025-30722 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30722">CVE-2025-30722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50077/">CVE-2025-50077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50077">CVE-2025-50077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50078/">CVE-2025-50078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50078">CVE-2025-50078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50079/">CVE-2025-50079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50079">CVE-2025-50079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50080/">CVE-2025-50080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50080">CVE-2025-50080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50081/">CVE-2025-50081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50081">CVE-2025-50081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50082/">CVE-2025-50082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50082">CVE-2025-50082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50083/">CVE-2025-50083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50083">CVE-2025-50083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50084/">CVE-2025-50084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50084">CVE-2025-50084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50085/">CVE-2025-50085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50085">CVE-2025-50085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50086/">CVE-2025-50086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50086">CVE-2025-50086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50087/">CVE-2025-50087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50087">CVE-2025-50087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50088/">CVE-2025-50088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50088">CVE-2025-50088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50091/">CVE-2025-50091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50091">CVE-2025-50091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50092/">CVE-2025-50092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50092">CVE-2025-50092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50093/">CVE-2025-50093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50093">CVE-2025-50093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50094/">CVE-2025-50094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50094">CVE-2025-50094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50096/">CVE-2025-50096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50096">CVE-2025-50096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50097/">CVE-2025-50097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50097">CVE-2025-50097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50098/">CVE-2025-50098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50098">CVE-2025-50098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50099/">CVE-2025-50099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50099">CVE-2025-50099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50100/">CVE-2025-50100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50100">CVE-2025-50100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50101/">CVE-2025-50101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50101">CVE-2025-50101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50102/">CVE-2025-50102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50102">CVE-2025-50102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50104/">CVE-2025-50104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50104">CVE-2025-50104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53023/">CVE-2025-53023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53023">CVE-2025-53023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018655" comment="mysql-8.0.43-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018656" comment="mysql-common-8.0.43-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018657" comment="mysql-devel-8.0.43-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018658" comment="mysql-errmsg-8.0.43-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018659" comment="mysql-libs-8.0.43-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018660" comment="mysql-server-8.0.43-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018661" comment="mysql-test-8.0.43-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4580" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-10527" ref_url="https://www.suse.com/security/cve/CVE-2025-10527/" source="CVE"/>
		<reference ref_id="CVE-2025-10528" ref_url="https://www.suse.com/security/cve/CVE-2025-10528/" source="CVE"/>
		<reference ref_id="CVE-2025-10529" ref_url="https://www.suse.com/security/cve/CVE-2025-10529/" source="CVE"/>
		<reference ref_id="CVE-2025-10532" ref_url="https://www.suse.com/security/cve/CVE-2025-10532/" source="CVE"/>
		<reference ref_id="CVE-2025-10533" ref_url="https://www.suse.com/security/cve/CVE-2025-10533/" source="CVE"/>
		<reference ref_id="CVE-2025-10536" ref_url="https://www.suse.com/security/cve/CVE-2025-10536/" source="CVE"/>
		<reference ref_id="CVE-2025-10537" ref_url="https://www.suse.com/security/cve/CVE-2025-10537/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16108.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16108.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10527/">CVE-2025-10527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10527">CVE-2025-10527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10528/">CVE-2025-10528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10528">CVE-2025-10528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10529/">CVE-2025-10529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10529">CVE-2025-10529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10532/">CVE-2025-10532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10532">CVE-2025-10532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10533/">CVE-2025-10533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10533">CVE-2025-10533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10536/">CVE-2025-10536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10536">CVE-2025-10536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10537/">CVE-2025-10537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10537">CVE-2025-10537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018753" comment="firefox-140.3.0-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018754" comment="firefox-x11-140.3.0-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4581" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-32988" ref_url="https://www.suse.com/security/cve/CVE-2025-32988/" source="CVE"/>
		<reference ref_id="CVE-2025-32989" ref_url="https://www.suse.com/security/cve/CVE-2025-32989/" source="CVE"/>
		<reference ref_id="CVE-2025-32990" ref_url="https://www.suse.com/security/cve/CVE-2025-32990/" source="CVE"/>
		<reference ref_id="CVE-2025-6395" ref_url="https://www.suse.com/security/cve/CVE-2025-6395/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16116.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16116.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32988/">CVE-2025-32988 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32988">CVE-2025-32988 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32989/">CVE-2025-32989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32989">CVE-2025-32989 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32990/">CVE-2025-32990 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32990">CVE-2025-32990 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6395/">CVE-2025-6395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6395">CVE-2025-6395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018662" comment="gnutls-3.8.3-6.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018663" comment="gnutls-c++-3.8.3-6.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018664" comment="gnutls-dane-3.8.3-6.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018665" comment="gnutls-devel-3.8.3-6.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018666" comment="gnutls-utils-3.8.3-6.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4582" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22150" ref_url="https://www.suse.com/security/cve/CVE-2025-22150/" source="CVE"/>
		<reference ref_id="CVE-2025-23083" ref_url="https://www.suse.com/security/cve/CVE-2025-23083/" source="CVE"/>
		<reference ref_id="CVE-2025-23085" ref_url="https://www.suse.com/security/cve/CVE-2025-23085/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1613.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1613.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22150/">CVE-2025-22150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22150">CVE-2025-22150 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23083/">CVE-2025-23083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23083">CVE-2025-23083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23085/">CVE-2025-23085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23085">CVE-2025-23085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964799" comment="nodejs-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964800" comment="nodejs-devel-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964801" comment="nodejs-docs-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964802" comment="nodejs-full-i18n-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964803" comment="nodejs-libs-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964804" comment="nodejs-nodemon-3.0.1-1.module+el9.5.0+22763+17233acb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964805" comment="nodejs-packaging-2021.06-4.module+el9.5.0+22763+17233acb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964806" comment="nodejs-packaging-bundler-2021.06-4.module+el9.5.0+22763+17233acb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964807" comment="npm-10.9.2-1.22.13.1.1.module+el9.5.0+22763+17233acb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964808" comment="v8-12.4-devel-12.4.254.21-1.22.13.1.1.module+el9.5.0+22763+17233acb is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4583" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-10527" ref_url="https://www.suse.com/security/cve/CVE-2025-10527/" source="CVE"/>
		<reference ref_id="CVE-2025-10528" ref_url="https://www.suse.com/security/cve/CVE-2025-10528/" source="CVE"/>
		<reference ref_id="CVE-2025-10529" ref_url="https://www.suse.com/security/cve/CVE-2025-10529/" source="CVE"/>
		<reference ref_id="CVE-2025-10532" ref_url="https://www.suse.com/security/cve/CVE-2025-10532/" source="CVE"/>
		<reference ref_id="CVE-2025-10533" ref_url="https://www.suse.com/security/cve/CVE-2025-10533/" source="CVE"/>
		<reference ref_id="CVE-2025-10536" ref_url="https://www.suse.com/security/cve/CVE-2025-10536/" source="CVE"/>
		<reference ref_id="CVE-2025-10537" ref_url="https://www.suse.com/security/cve/CVE-2025-10537/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16156.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16156.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10527/">CVE-2025-10527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10527">CVE-2025-10527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10528/">CVE-2025-10528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10528">CVE-2025-10528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10529/">CVE-2025-10529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10529">CVE-2025-10529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10532/">CVE-2025-10532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10532">CVE-2025-10532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10533/">CVE-2025-10533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10533">CVE-2025-10533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10536/">CVE-2025-10536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10536">CVE-2025-10536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10537/">CVE-2025-10537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10537">CVE-2025-10537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018755" comment="thunderbird-140.3.0-1.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4584" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-53125" ref_url="https://www.suse.com/security/cve/CVE-2023-53125/" source="CVE"/>
		<reference ref_id="CVE-2025-37810" ref_url="https://www.suse.com/security/cve/CVE-2025-37810/" source="CVE"/>
		<reference ref_id="CVE-2025-38498" ref_url="https://www.suse.com/security/cve/CVE-2025-38498/" source="CVE"/>
		<reference ref_id="CVE-2025-39694" ref_url="https://www.suse.com/security/cve/CVE-2025-39694/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16398.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16398.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53125/">CVE-2023-53125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53125">CVE-2023-53125 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37810/">CVE-2025-37810 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37810">CVE-2025-37810 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38498/">CVE-2025-38498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38498">CVE-2025-38498 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39694/">CVE-2025-39694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39694">CVE-2025-39694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019488" comment="kernel-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019489" comment="kernel-abi-stablelists-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019490" comment="kernel-core-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019491" comment="kernel-cross-headers-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019492" comment="kernel-debug-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019493" comment="kernel-debug-core-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019496" comment="kernel-debug-modules-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019497" comment="kernel-debug-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019498" comment="kernel-debug-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019499" comment="kernel-debug-uki-virt-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019502" comment="kernel-doc-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019503" comment="kernel-headers-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019504" comment="kernel-modules-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019505" comment="kernel-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019506" comment="kernel-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019507" comment="kernel-rt-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019508" comment="kernel-rt-core-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019509" comment="kernel-rt-debug-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019510" comment="kernel-rt-debug-core-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019512" comment="kernel-rt-debug-kvm-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019513" comment="kernel-rt-debug-modules-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019514" comment="kernel-rt-debug-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019515" comment="kernel-rt-debug-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019517" comment="kernel-rt-kvm-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019518" comment="kernel-rt-modules-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019519" comment="kernel-rt-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019520" comment="kernel-rt-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019521" comment="kernel-tools-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019522" comment="kernel-tools-libs-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019524" comment="kernel-uki-virt-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019525" comment="kernel-uki-virt-addons-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019526" comment="libperf-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019527" comment="perf-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019528" comment="python3-perf-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019529" comment="rtla-5.14.0-570.46.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019530" comment="rv-5.14.0-570.46.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4585" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-52490" ref_url="https://www.suse.com/security/cve/CVE-2023-52490/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1659.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1659.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52490/">CVE-2023-52490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52490">CVE-2023-52490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965064" comment="bpftool-7.4.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965065" comment="kernel-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965066" comment="kernel-abi-stablelists-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965067" comment="kernel-core-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965068" comment="kernel-cross-headers-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965069" comment="kernel-debug-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965070" comment="kernel-debug-core-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965073" comment="kernel-debug-modules-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965074" comment="kernel-debug-modules-core-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965075" comment="kernel-debug-modules-extra-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965076" comment="kernel-debug-uki-virt-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965079" comment="kernel-doc-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965080" comment="kernel-headers-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965081" comment="kernel-modules-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965082" comment="kernel-modules-core-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965083" comment="kernel-modules-extra-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965084" comment="kernel-tools-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965085" comment="kernel-tools-libs-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965087" comment="kernel-uki-virt-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965088" comment="kernel-uki-virt-addons-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965089" comment="libperf-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965090" comment="perf-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965091" comment="python3-perf-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965092" comment="rtla-5.14.0-503.26.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965093" comment="rv-5.14.0-503.26.1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4586" version="1" class="patch">
	<metadata>
		<title>security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-11053" ref_url="https://www.suse.com/security/cve/CVE-2024-11053/" source="CVE"/>
		<reference ref_id="CVE-2024-21193" ref_url="https://www.suse.com/security/cve/CVE-2024-21193/" source="CVE"/>
		<reference ref_id="CVE-2024-21194" ref_url="https://www.suse.com/security/cve/CVE-2024-21194/" source="CVE"/>
		<reference ref_id="CVE-2024-21196" ref_url="https://www.suse.com/security/cve/CVE-2024-21196/" source="CVE"/>
		<reference ref_id="CVE-2024-21197" ref_url="https://www.suse.com/security/cve/CVE-2024-21197/" source="CVE"/>
		<reference ref_id="CVE-2024-21198" ref_url="https://www.suse.com/security/cve/CVE-2024-21198/" source="CVE"/>
		<reference ref_id="CVE-2024-21199" ref_url="https://www.suse.com/security/cve/CVE-2024-21199/" source="CVE"/>
		<reference ref_id="CVE-2024-21201" ref_url="https://www.suse.com/security/cve/CVE-2024-21201/" source="CVE"/>
		<reference ref_id="CVE-2024-21203" ref_url="https://www.suse.com/security/cve/CVE-2024-21203/" source="CVE"/>
		<reference ref_id="CVE-2024-21212" ref_url="https://www.suse.com/security/cve/CVE-2024-21212/" source="CVE"/>
		<reference ref_id="CVE-2024-21213" ref_url="https://www.suse.com/security/cve/CVE-2024-21213/" source="CVE"/>
		<reference ref_id="CVE-2024-21218" ref_url="https://www.suse.com/security/cve/CVE-2024-21218/" source="CVE"/>
		<reference ref_id="CVE-2024-21219" ref_url="https://www.suse.com/security/cve/CVE-2024-21219/" source="CVE"/>
		<reference ref_id="CVE-2024-21230" ref_url="https://www.suse.com/security/cve/CVE-2024-21230/" source="CVE"/>
		<reference ref_id="CVE-2024-21231" ref_url="https://www.suse.com/security/cve/CVE-2024-21231/" source="CVE"/>
		<reference ref_id="CVE-2024-21236" ref_url="https://www.suse.com/security/cve/CVE-2024-21236/" source="CVE"/>
		<reference ref_id="CVE-2024-21237" ref_url="https://www.suse.com/security/cve/CVE-2024-21237/" source="CVE"/>
		<reference ref_id="CVE-2024-21238" ref_url="https://www.suse.com/security/cve/CVE-2024-21238/" source="CVE"/>
		<reference ref_id="CVE-2024-21239" ref_url="https://www.suse.com/security/cve/CVE-2024-21239/" source="CVE"/>
		<reference ref_id="CVE-2024-21241" ref_url="https://www.suse.com/security/cve/CVE-2024-21241/" source="CVE"/>
		<reference ref_id="CVE-2024-21247" ref_url="https://www.suse.com/security/cve/CVE-2024-21247/" source="CVE"/>
		<reference ref_id="CVE-2024-37371" ref_url="https://www.suse.com/security/cve/CVE-2024-37371/" source="CVE"/>
		<reference ref_id="CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535/" source="CVE"/>
		<reference ref_id="CVE-2024-7264" ref_url="https://www.suse.com/security/cve/CVE-2024-7264/" source="CVE"/>
		<reference ref_id="CVE-2025-21490" ref_url="https://www.suse.com/security/cve/CVE-2025-21490/" source="CVE"/>
		<reference ref_id="CVE-2025-21491" ref_url="https://www.suse.com/security/cve/CVE-2025-21491/" source="CVE"/>
		<reference ref_id="CVE-2025-21494" ref_url="https://www.suse.com/security/cve/CVE-2025-21494/" source="CVE"/>
		<reference ref_id="CVE-2025-21497" ref_url="https://www.suse.com/security/cve/CVE-2025-21497/" source="CVE"/>
		<reference ref_id="CVE-2025-21500" ref_url="https://www.suse.com/security/cve/CVE-2025-21500/" source="CVE"/>
		<reference ref_id="CVE-2025-21501" ref_url="https://www.suse.com/security/cve/CVE-2025-21501/" source="CVE"/>
		<reference ref_id="CVE-2025-21503" ref_url="https://www.suse.com/security/cve/CVE-2025-21503/" source="CVE"/>
		<reference ref_id="CVE-2025-21504" ref_url="https://www.suse.com/security/cve/CVE-2025-21504/" source="CVE"/>
		<reference ref_id="CVE-2025-21505" ref_url="https://www.suse.com/security/cve/CVE-2025-21505/" source="CVE"/>
		<reference ref_id="CVE-2025-21518" ref_url="https://www.suse.com/security/cve/CVE-2025-21518/" source="CVE"/>
		<reference ref_id="CVE-2025-21519" ref_url="https://www.suse.com/security/cve/CVE-2025-21519/" source="CVE"/>
		<reference ref_id="CVE-2025-21520" ref_url="https://www.suse.com/security/cve/CVE-2025-21520/" source="CVE"/>
		<reference ref_id="CVE-2025-21521" ref_url="https://www.suse.com/security/cve/CVE-2025-21521/" source="CVE"/>
		<reference ref_id="CVE-2025-21522" ref_url="https://www.suse.com/security/cve/CVE-2025-21522/" source="CVE"/>
		<reference ref_id="CVE-2025-21523" ref_url="https://www.suse.com/security/cve/CVE-2025-21523/" source="CVE"/>
		<reference ref_id="CVE-2025-21525" ref_url="https://www.suse.com/security/cve/CVE-2025-21525/" source="CVE"/>
		<reference ref_id="CVE-2025-21529" ref_url="https://www.suse.com/security/cve/CVE-2025-21529/" source="CVE"/>
		<reference ref_id="CVE-2025-21531" ref_url="https://www.suse.com/security/cve/CVE-2025-21531/" source="CVE"/>
		<reference ref_id="CVE-2025-21534" ref_url="https://www.suse.com/security/cve/CVE-2025-21534/" source="CVE"/>
		<reference ref_id="CVE-2025-21536" ref_url="https://www.suse.com/security/cve/CVE-2025-21536/" source="CVE"/>
		<reference ref_id="CVE-2025-21540" ref_url="https://www.suse.com/security/cve/CVE-2025-21540/" source="CVE"/>
		<reference ref_id="CVE-2025-21543" ref_url="https://www.suse.com/security/cve/CVE-2025-21543/" source="CVE"/>
		<reference ref_id="CVE-2025-21546" ref_url="https://www.suse.com/security/cve/CVE-2025-21546/" source="CVE"/>
		<reference ref_id="CVE-2025-21555" ref_url="https://www.suse.com/security/cve/CVE-2025-21555/" source="CVE"/>
		<reference ref_id="CVE-2025-21559" ref_url="https://www.suse.com/security/cve/CVE-2025-21559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1671.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1671.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-11053/">CVE-2024-11053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11053">CVE-2024-11053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21193/">CVE-2024-21193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21193">CVE-2024-21193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21194/">CVE-2024-21194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21194">CVE-2024-21194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21196/">CVE-2024-21196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21196">CVE-2024-21196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21197/">CVE-2024-21197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21197">CVE-2024-21197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21198/">CVE-2024-21198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21198">CVE-2024-21198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21199/">CVE-2024-21199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21199">CVE-2024-21199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21201/">CVE-2024-21201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21201">CVE-2024-21201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21203/">CVE-2024-21203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21203">CVE-2024-21203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21212/">CVE-2024-21212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21212">CVE-2024-21212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21213/">CVE-2024-21213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21213">CVE-2024-21213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21218/">CVE-2024-21218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21218">CVE-2024-21218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21219/">CVE-2024-21219 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21219">CVE-2024-21219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21230/">CVE-2024-21230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21230">CVE-2024-21230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21231/">CVE-2024-21231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21231">CVE-2024-21231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21236/">CVE-2024-21236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21236">CVE-2024-21236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21237/">CVE-2024-21237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21237">CVE-2024-21237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21238/">CVE-2024-21238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21238">CVE-2024-21238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21239/">CVE-2024-21239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21239">CVE-2024-21239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21241/">CVE-2024-21241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21241">CVE-2024-21241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21247/">CVE-2024-21247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21247">CVE-2024-21247 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37371/">CVE-2024-37371 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7264/">CVE-2024-7264 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7264">CVE-2024-7264 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21490/">CVE-2025-21490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21490">CVE-2025-21490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21491/">CVE-2025-21491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21491">CVE-2025-21491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21494/">CVE-2025-21494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21494">CVE-2025-21494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21497/">CVE-2025-21497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21497">CVE-2025-21497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21500/">CVE-2025-21500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21500">CVE-2025-21500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21501/">CVE-2025-21501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21501">CVE-2025-21501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21503/">CVE-2025-21503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21503">CVE-2025-21503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21504/">CVE-2025-21504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21504">CVE-2025-21504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21505/">CVE-2025-21505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21505">CVE-2025-21505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21518/">CVE-2025-21518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21518">CVE-2025-21518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21519/">CVE-2025-21519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21519">CVE-2025-21519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21520/">CVE-2025-21520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21520">CVE-2025-21520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21521/">CVE-2025-21521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21521">CVE-2025-21521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21522/">CVE-2025-21522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21522">CVE-2025-21522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21523/">CVE-2025-21523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21523">CVE-2025-21523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21525/">CVE-2025-21525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21525">CVE-2025-21525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21529/">CVE-2025-21529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21529">CVE-2025-21529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21531/">CVE-2025-21531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21531">CVE-2025-21531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21534/">CVE-2025-21534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21534">CVE-2025-21534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21536/">CVE-2025-21536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21536">CVE-2025-21536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21540/">CVE-2025-21540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21540">CVE-2025-21540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21543/">CVE-2025-21543 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21543">CVE-2025-21543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21546/">CVE-2025-21546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21546">CVE-2025-21546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21555/">CVE-2025-21555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21555">CVE-2025-21555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21559/">CVE-2025-21559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21559">CVE-2025-21559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4587" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-11187" ref_url="https://www.suse.com/security/cve/CVE-2024-11187/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1681.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1681.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11187/">CVE-2024-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11187">CVE-2024-11187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965101" comment="bind-9.16.23-24.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965102" comment="bind-chroot-9.16.23-24.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965103" comment="bind-devel-9.16.23-24.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965104" comment="bind-dnssec-doc-9.16.23-24.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965105" comment="bind-dnssec-utils-9.16.23-24.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965106" comment="bind-doc-9.16.23-24.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965107" comment="bind-libs-9.16.23-24.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965108" comment="bind-license-9.16.23-24.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965109" comment="bind-utils-9.16.23-24.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965110" comment="python3-bind-9.16.23-24.el9_5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4588" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-38472" ref_url="https://www.suse.com/security/cve/CVE-2025-38472/" source="CVE"/>
		<reference ref_id="CVE-2025-38527" ref_url="https://www.suse.com/security/cve/CVE-2025-38527/" source="CVE"/>
		<reference ref_id="CVE-2025-38718" ref_url="https://www.suse.com/security/cve/CVE-2025-38718/" source="CVE"/>
		<reference ref_id="CVE-2025-39682" ref_url="https://www.suse.com/security/cve/CVE-2025-39682/" source="CVE"/>
		<reference ref_id="CVE-2025-39698" ref_url="https://www.suse.com/security/cve/CVE-2025-39698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16880.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16880.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38472/">CVE-2025-38472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38472">CVE-2025-38472 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38527/">CVE-2025-38527 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38527">CVE-2025-38527 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38718/">CVE-2025-38718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-39682/">CVE-2025-39682 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39682">CVE-2025-39682 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39698/">CVE-2025-39698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39698">CVE-2025-39698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019798" comment="kernel-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019799" comment="kernel-abi-stablelists-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019800" comment="kernel-core-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019801" comment="kernel-cross-headers-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019802" comment="kernel-debug-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019803" comment="kernel-debug-core-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019806" comment="kernel-debug-modules-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019807" comment="kernel-debug-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019808" comment="kernel-debug-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019809" comment="kernel-debug-uki-virt-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019812" comment="kernel-doc-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019813" comment="kernel-headers-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019814" comment="kernel-modules-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019815" comment="kernel-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019816" comment="kernel-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019817" comment="kernel-rt-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019818" comment="kernel-rt-core-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019819" comment="kernel-rt-debug-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019820" comment="kernel-rt-debug-core-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019822" comment="kernel-rt-debug-kvm-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019823" comment="kernel-rt-debug-modules-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019824" comment="kernel-rt-debug-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019825" comment="kernel-rt-debug-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019827" comment="kernel-rt-kvm-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019828" comment="kernel-rt-modules-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019829" comment="kernel-rt-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019830" comment="kernel-rt-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019831" comment="kernel-tools-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019832" comment="kernel-tools-libs-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019834" comment="kernel-uki-virt-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019835" comment="kernel-uki-virt-addons-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019836" comment="libperf-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019837" comment="perf-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019838" comment="python3-perf-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019839" comment="rtla-5.14.0-570.49.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019840" comment="rv-5.14.0-570.49.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4589" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-7493" ref_url="https://www.suse.com/security/cve/CVE-2025-7493/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17084.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17084.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-7493/">CVE-2025-7493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7493">CVE-2025-7493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020050" comment="ipa-client-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020051" comment="ipa-client-common-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020052" comment="ipa-client-encrypted-dns-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020053" comment="ipa-client-epn-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020054" comment="ipa-client-samba-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020055" comment="ipa-common-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020056" comment="ipa-selinux-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020057" comment="ipa-selinux-luna-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020058" comment="ipa-selinux-nfast-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020059" comment="ipa-server-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020060" comment="ipa-server-common-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020061" comment="ipa-server-dns-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020062" comment="ipa-server-encrypted-dns-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020063" comment="ipa-server-trust-ad-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020064" comment="python3-ipaclient-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020065" comment="python3-ipalib-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020066" comment="python3-ipaserver-4.12.2-14.el9_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020067" comment="python3-ipatests-4.12.2-14.el9_6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4590" version="1" class="patch">
	<metadata>
		<title>security update for perl-JSON-XS (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-40928" ref_url="https://www.suse.com/security/cve/CVE-2025-40928/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17162.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17162.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40928/">CVE-2025-40928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40928">CVE-2025-40928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021392" comment="perl-JSON-XS-4.04-1.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4591" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-50301" ref_url="https://www.suse.com/security/cve/CVE-2024-50301/" source="CVE"/>
		<reference ref_id="CVE-2025-38351" ref_url="https://www.suse.com/security/cve/CVE-2025-38351/" source="CVE"/>
		<reference ref_id="CVE-2025-39761" ref_url="https://www.suse.com/security/cve/CVE-2025-39761/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17377.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17377.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50301/">CVE-2024-50301 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38351/">CVE-2025-38351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38351">CVE-2025-38351 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39761/">CVE-2025-39761 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39761">CVE-2025-39761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020388" comment="kernel-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020389" comment="kernel-abi-stablelists-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020390" comment="kernel-core-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020391" comment="kernel-cross-headers-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020392" comment="kernel-debug-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020393" comment="kernel-debug-core-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020396" comment="kernel-debug-modules-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020397" comment="kernel-debug-modules-core-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020398" comment="kernel-debug-modules-extra-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020399" comment="kernel-debug-uki-virt-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020402" comment="kernel-doc-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020403" comment="kernel-headers-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020404" comment="kernel-modules-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020405" comment="kernel-modules-core-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020406" comment="kernel-modules-extra-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020407" comment="kernel-rt-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020408" comment="kernel-rt-core-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020409" comment="kernel-rt-debug-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020410" comment="kernel-rt-debug-core-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020412" comment="kernel-rt-debug-kvm-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020413" comment="kernel-rt-debug-modules-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020414" comment="kernel-rt-debug-modules-core-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020415" comment="kernel-rt-debug-modules-extra-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020417" comment="kernel-rt-kvm-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020418" comment="kernel-rt-modules-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020419" comment="kernel-rt-modules-core-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020420" comment="kernel-rt-modules-extra-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020421" comment="kernel-tools-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020422" comment="kernel-tools-libs-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020424" comment="kernel-uki-virt-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020425" comment="kernel-uki-virt-addons-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020426" comment="libperf-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020427" comment="perf-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020428" comment="python3-perf-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020429" comment="rtla-5.14.0-570.51.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020430" comment="rv-5.14.0-570.51.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4592" version="1" class="patch">
	<metadata>
		<title>security update for libpq (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1738.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1738.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965294" comment="libpq-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965295" comment="libpq-devel-13.20-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4593" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1742.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1742.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965296" comment="postgresql-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965297" comment="postgresql-contrib-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965298" comment="postgresql-docs-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965299" comment="postgresql-plperl-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965300" comment="postgresql-plpython3-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965301" comment="postgresql-pltcl-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965302" comment="postgresql-private-devel-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965303" comment="postgresql-private-libs-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965304" comment="postgresql-server-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965305" comment="postgresql-server-devel-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965306" comment="postgresql-static-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965307" comment="postgresql-test-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965308" comment="postgresql-test-rpm-macros-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965309" comment="postgresql-upgrade-13.20-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965310" comment="postgresql-upgrade-devel-13.20-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4594" version="1" class="patch">
	<metadata>
		<title>security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-41244" ref_url="https://www.suse.com/security/cve/CVE-2025-41244/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17428.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17428.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-41244/">CVE-2025-41244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41244">CVE-2025-41244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020560" comment="open-vm-tools-12.5.0-1.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020561" comment="open-vm-tools-desktop-12.5.0-1.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020562" comment="open-vm-tools-salt-minion-12.5.0-1.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020563" comment="open-vm-tools-sdmp-12.5.0-1.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020564" comment="open-vm-tools-test-12.5.0-1.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4595" version="1" class="patch">
	<metadata>
		<title>security update for iputils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-48964" ref_url="https://www.suse.com/security/cve/CVE-2025-48964/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17558.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17558.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48964/">CVE-2025-48964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48964">CVE-2025-48964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020431" comment="iputils-20210202-11.el9_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020432" comment="iputils-ninfod-20210202-11.el9_6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4596" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-53905" ref_url="https://www.suse.com/security/cve/CVE-2025-53905/" source="CVE"/>
		<reference ref_id="CVE-2025-53906" ref_url="https://www.suse.com/security/cve/CVE-2025-53906/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17742.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17742.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53905/">CVE-2025-53905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53905">CVE-2025-53905 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-53906/">CVE-2025-53906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53906">CVE-2025-53906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020779" comment="vim-X11-8.2.2637-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020780" comment="vim-common-8.2.2637-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020781" comment="vim-enhanced-8.2.2637-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020782" comment="vim-filesystem-8.2.2637-22.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020783" comment="vim-minimal-8.2.2637-22.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4597" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-53373" ref_url="https://www.suse.com/security/cve/CVE-2023-53373/" source="CVE"/>
		<reference ref_id="CVE-2025-38556" ref_url="https://www.suse.com/security/cve/CVE-2025-38556/" source="CVE"/>
		<reference ref_id="CVE-2025-38614" ref_url="https://www.suse.com/security/cve/CVE-2025-38614/" source="CVE"/>
		<reference ref_id="CVE-2025-39757" ref_url="https://www.suse.com/security/cve/CVE-2025-39757/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17760.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17760.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53373/">CVE-2023-53373 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53373">CVE-2023-53373 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38556/">CVE-2025-38556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38556">CVE-2025-38556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38614/">CVE-2025-38614 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38614">CVE-2025-38614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39757/">CVE-2025-39757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010021393" comment="kernel-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021394" comment="kernel-abi-stablelists-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021395" comment="kernel-core-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021396" comment="kernel-cross-headers-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021397" comment="kernel-debug-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021398" comment="kernel-debug-core-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021401" comment="kernel-debug-modules-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021402" comment="kernel-debug-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021403" comment="kernel-debug-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021404" comment="kernel-debug-uki-virt-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021407" comment="kernel-doc-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021408" comment="kernel-headers-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021409" comment="kernel-modules-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021410" comment="kernel-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021411" comment="kernel-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021412" comment="kernel-rt-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021413" comment="kernel-rt-core-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021414" comment="kernel-rt-debug-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021415" comment="kernel-rt-debug-core-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021417" comment="kernel-rt-debug-kvm-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021418" comment="kernel-rt-debug-modules-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021419" comment="kernel-rt-debug-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021420" comment="kernel-rt-debug-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021422" comment="kernel-rt-kvm-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021423" comment="kernel-rt-modules-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021424" comment="kernel-rt-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021425" comment="kernel-rt-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021426" comment="kernel-tools-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021427" comment="kernel-tools-libs-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021429" comment="kernel-uki-virt-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021430" comment="kernel-uki-virt-addons-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021431" comment="libperf-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021432" comment="perf-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021433" comment="python3-perf-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021434" comment="rtla-5.14.0-570.52.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021435" comment="rv-5.14.0-570.52.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4598" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-31223" ref_url="https://www.suse.com/security/cve/CVE-2025-31223/" source="CVE"/>
		<reference ref_id="CVE-2025-31277" ref_url="https://www.suse.com/security/cve/CVE-2025-31277/" source="CVE"/>
		<reference ref_id="CVE-2025-43272" ref_url="https://www.suse.com/security/cve/CVE-2025-43272/" source="CVE"/>
		<reference ref_id="CVE-2025-43342" ref_url="https://www.suse.com/security/cve/CVE-2025-43342/" source="CVE"/>
		<reference ref_id="CVE-2025-43343" ref_url="https://www.suse.com/security/cve/CVE-2025-43343/" source="CVE"/>
		<reference ref_id="CVE-2025-43356" ref_url="https://www.suse.com/security/cve/CVE-2025-43356/" source="CVE"/>
		<reference ref_id="CVE-2025-43368" ref_url="https://www.suse.com/security/cve/CVE-2025-43368/" source="CVE"/>
		<reference ref_id="CVE-2025-43419" ref_url="https://www.suse.com/security/cve/CVE-2025-43419/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18097.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18097.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31223/">CVE-2025-31223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31223">CVE-2025-31223 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31277/">CVE-2025-31277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31277">CVE-2025-31277 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43272/">CVE-2025-43272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43272">CVE-2025-43272 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-43342/">CVE-2025-43342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43342">CVE-2025-43342 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43343/">CVE-2025-43343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43343">CVE-2025-43343 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43356/">CVE-2025-43356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43356">CVE-2025-43356 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-43368/">CVE-2025-43368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43368">CVE-2025-43368 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43419/">CVE-2025-43419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43419">CVE-2025-43419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022618" comment="webkit2gtk3-2.50.1-0.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022619" comment="webkit2gtk3-devel-2.50.1-0.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022620" comment="webkit2gtk3-jsc-2.50.1-0.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022621" comment="webkit2gtk3-jsc-devel-2.50.1-0.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4599" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-55247" ref_url="https://www.suse.com/security/cve/CVE-2025-55247/" source="CVE"/>
		<reference ref_id="CVE-2025-55248" ref_url="https://www.suse.com/security/cve/CVE-2025-55248/" source="CVE"/>
		<reference ref_id="CVE-2025-55315" ref_url="https://www.suse.com/security/cve/CVE-2025-55315/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18149.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18149.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55247/">CVE-2025-55247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55247">CVE-2025-55247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55248/">CVE-2025-55248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55248">CVE-2025-55248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55315/">CVE-2025-55315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55315">CVE-2025-55315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010021803" comment="aspnetcore-runtime-8.0-8.0.21-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021804" comment="aspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021805" comment="aspnetcore-targeting-pack-8.0-8.0.21-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021806" comment="dotnet-apphost-pack-8.0-8.0.21-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021807" comment="dotnet-hostfxr-8.0-8.0.21-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021808" comment="dotnet-runtime-8.0-8.0.21-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021809" comment="dotnet-runtime-dbg-8.0-8.0.21-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021810" comment="dotnet-sdk-8.0-8.0.121-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021811" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021812" comment="dotnet-sdk-dbg-8.0-8.0.121-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021813" comment="dotnet-targeting-pack-8.0-8.0.21-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021814" comment="dotnet-templates-8.0-8.0.121-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4600" version="1" class="patch">
	<metadata>
		<title>security update for dotnet9.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-55247" ref_url="https://www.suse.com/security/cve/CVE-2025-55247/" source="CVE"/>
		<reference ref_id="CVE-2025-55248" ref_url="https://www.suse.com/security/cve/CVE-2025-55248/" source="CVE"/>
		<reference ref_id="CVE-2025-55315" ref_url="https://www.suse.com/security/cve/CVE-2025-55315/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18151.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18151.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55247/">CVE-2025-55247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55247">CVE-2025-55247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55248/">CVE-2025-55248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55248">CVE-2025-55248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55315/">CVE-2025-55315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55315">CVE-2025-55315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010021815" comment="aspnetcore-runtime-9.0-9.0.10-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021816" comment="aspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021817" comment="aspnetcore-targeting-pack-9.0-9.0.10-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021818" comment="dotnet-apphost-pack-9.0-9.0.10-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021819" comment="dotnet-host-9.0.10-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021820" comment="dotnet-hostfxr-9.0-9.0.10-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021821" comment="dotnet-runtime-9.0-9.0.10-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021822" comment="dotnet-runtime-dbg-9.0-9.0.10-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021823" comment="dotnet-sdk-9.0-9.0.111-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021824" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021825" comment="dotnet-sdk-aot-9.0-9.0.111-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021826" comment="dotnet-sdk-dbg-9.0-9.0.111-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021827" comment="dotnet-targeting-pack-9.0-9.0.10-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021828" comment="dotnet-templates-9.0-9.0.111-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021829" comment="netstandard-targeting-pack-2.1-9.0.111-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4601" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-11708" ref_url="https://www.suse.com/security/cve/CVE-2025-11708/" source="CVE"/>
		<reference ref_id="CVE-2025-11709" ref_url="https://www.suse.com/security/cve/CVE-2025-11709/" source="CVE"/>
		<reference ref_id="CVE-2025-11710" ref_url="https://www.suse.com/security/cve/CVE-2025-11710/" source="CVE"/>
		<reference ref_id="CVE-2025-11711" ref_url="https://www.suse.com/security/cve/CVE-2025-11711/" source="CVE"/>
		<reference ref_id="CVE-2025-11712" ref_url="https://www.suse.com/security/cve/CVE-2025-11712/" source="CVE"/>
		<reference ref_id="CVE-2025-11714" ref_url="https://www.suse.com/security/cve/CVE-2025-11714/" source="CVE"/>
		<reference ref_id="CVE-2025-11715" ref_url="https://www.suse.com/security/cve/CVE-2025-11715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18155.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18155.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11708/">CVE-2025-11708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11708">CVE-2025-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11709/">CVE-2025-11709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11709">CVE-2025-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11710/">CVE-2025-11710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11710">CVE-2025-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11711/">CVE-2025-11711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11711">CVE-2025-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11712/">CVE-2025-11712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11712">CVE-2025-11712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11714/">CVE-2025-11714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11714">CVE-2025-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11715/">CVE-2025-11715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11715">CVE-2025-11715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010021830" comment="firefox-140.4.0-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021831" comment="firefox-x11-140.4.0-3.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4602" version="1" class="patch">
	<metadata>
		<title>security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-5318" ref_url="https://www.suse.com/security/cve/CVE-2025-5318/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18275.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18275.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5318/">CVE-2025-5318 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5318">CVE-2025-5318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022061" comment="libssh-0.10.4-15.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022062" comment="libssh-config-0.10.4-15.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022063" comment="libssh-devel-0.10.4-15.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4603" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-50087" ref_url="https://www.suse.com/security/cve/CVE-2022-50087/" source="CVE"/>
		<reference ref_id="CVE-2025-22026" ref_url="https://www.suse.com/security/cve/CVE-2025-22026/" source="CVE"/>
		<reference ref_id="CVE-2025-38566" ref_url="https://www.suse.com/security/cve/CVE-2025-38566/" source="CVE"/>
		<reference ref_id="CVE-2025-38571" ref_url="https://www.suse.com/security/cve/CVE-2025-38571/" source="CVE"/>
		<reference ref_id="CVE-2025-39817" ref_url="https://www.suse.com/security/cve/CVE-2025-39817/" source="CVE"/>
		<reference ref_id="CVE-2025-39841" ref_url="https://www.suse.com/security/cve/CVE-2025-39841/" source="CVE"/>
		<reference ref_id="CVE-2025-39849" ref_url="https://www.suse.com/security/cve/CVE-2025-39849/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18281.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18281.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50087/">CVE-2022-50087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50087">CVE-2022-50087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22026/">CVE-2025-22026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22026">CVE-2025-22026 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38566/">CVE-2025-38566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38566">CVE-2025-38566 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38571/">CVE-2025-38571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38571">CVE-2025-38571 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39817/">CVE-2025-39817 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39817">CVE-2025-39817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39841/">CVE-2025-39841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39841">CVE-2025-39841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39849/">CVE-2025-39849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39849">CVE-2025-39849 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023062" comment="kernel-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023063" comment="kernel-abi-stablelists-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023064" comment="kernel-core-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023065" comment="kernel-cross-headers-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023066" comment="kernel-debug-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023067" comment="kernel-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023070" comment="kernel-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023071" comment="kernel-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023072" comment="kernel-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023073" comment="kernel-debug-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023076" comment="kernel-doc-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023077" comment="kernel-headers-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023078" comment="kernel-modules-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023079" comment="kernel-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023080" comment="kernel-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023081" comment="kernel-rt-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023082" comment="kernel-rt-core-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023083" comment="kernel-rt-debug-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023084" comment="kernel-rt-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023086" comment="kernel-rt-debug-kvm-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023087" comment="kernel-rt-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023088" comment="kernel-rt-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023089" comment="kernel-rt-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023091" comment="kernel-rt-kvm-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023092" comment="kernel-rt-modules-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023093" comment="kernel-rt-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023094" comment="kernel-rt-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023095" comment="kernel-tools-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023096" comment="kernel-tools-libs-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023098" comment="kernel-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023099" comment="kernel-uki-virt-addons-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023100" comment="libperf-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023101" comment="perf-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023102" comment="python3-perf-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023103" comment="rtla-5.14.0-570.55.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023104" comment="rv-5.14.0-570.55.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4604" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-11708" ref_url="https://www.suse.com/security/cve/CVE-2025-11708/" source="CVE"/>
		<reference ref_id="CVE-2025-11709" ref_url="https://www.suse.com/security/cve/CVE-2025-11709/" source="CVE"/>
		<reference ref_id="CVE-2025-11710" ref_url="https://www.suse.com/security/cve/CVE-2025-11710/" source="CVE"/>
		<reference ref_id="CVE-2025-11711" ref_url="https://www.suse.com/security/cve/CVE-2025-11711/" source="CVE"/>
		<reference ref_id="CVE-2025-11712" ref_url="https://www.suse.com/security/cve/CVE-2025-11712/" source="CVE"/>
		<reference ref_id="CVE-2025-11714" ref_url="https://www.suse.com/security/cve/CVE-2025-11714/" source="CVE"/>
		<reference ref_id="CVE-2025-11715" ref_url="https://www.suse.com/security/cve/CVE-2025-11715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18321.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18321.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11708/">CVE-2025-11708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11708">CVE-2025-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11709/">CVE-2025-11709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11709">CVE-2025-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11710/">CVE-2025-11710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11710">CVE-2025-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11711/">CVE-2025-11711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11711">CVE-2025-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11712/">CVE-2025-11712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11712">CVE-2025-11712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11714/">CVE-2025-11714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11714">CVE-2025-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11715/">CVE-2025-11715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11715">CVE-2025-11715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022848" comment="thunderbird-140.4.0-2.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4605" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18815.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18815.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023351" comment="java-1.8.0-openjdk-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023352" comment="java-1.8.0-openjdk-accessibility-1.8.0.472.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023353" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.472.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023354" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.472.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023355" comment="java-1.8.0-openjdk-demo-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023356" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023357" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023358" comment="java-1.8.0-openjdk-devel-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023359" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023360" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023361" comment="java-1.8.0-openjdk-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023362" comment="java-1.8.0-openjdk-headless-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023363" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023364" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023365" comment="java-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023366" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023367" comment="java-1.8.0-openjdk-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023368" comment="java-1.8.0-openjdk-src-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023369" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023370" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4606" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18818.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18818.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025669" comment="java-11-openjdk-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025494" comment="java-11-openjdk-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025670" comment="java-11-openjdk-demo-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025496" comment="java-11-openjdk-demo-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025497" comment="java-11-openjdk-demo-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025498" comment="java-11-openjdk-demo-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025671" comment="java-11-openjdk-devel-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025500" comment="java-11-openjdk-devel-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025501" comment="java-11-openjdk-devel-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025502" comment="java-11-openjdk-devel-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025503" comment="java-11-openjdk-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025672" comment="java-11-openjdk-headless-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025505" comment="java-11-openjdk-headless-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025506" comment="java-11-openjdk-headless-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025507" comment="java-11-openjdk-headless-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025673" comment="java-11-openjdk-javadoc-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025509" comment="java-11-openjdk-javadoc-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025674" comment="java-11-openjdk-javadoc-zip-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025511" comment="java-11-openjdk-javadoc-zip-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025675" comment="java-11-openjdk-jmods-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025513" comment="java-11-openjdk-jmods-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025514" comment="java-11-openjdk-jmods-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025515" comment="java-11-openjdk-jmods-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025516" comment="java-11-openjdk-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025676" comment="java-11-openjdk-src-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025518" comment="java-11-openjdk-src-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025519" comment="java-11-openjdk-src-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025520" comment="java-11-openjdk-src-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025677" comment="java-11-openjdk-static-libs-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025522" comment="java-11-openjdk-static-libs-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025523" comment="java-11-openjdk-static-libs-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025524" comment="java-11-openjdk-static-libs-slowdebug-11.0.29.0.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4607" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18821.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18821.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023371" comment="java-17-openjdk-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023372" comment="java-17-openjdk-demo-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023373" comment="java-17-openjdk-demo-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023374" comment="java-17-openjdk-demo-slowdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023375" comment="java-17-openjdk-devel-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023376" comment="java-17-openjdk-devel-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023377" comment="java-17-openjdk-devel-slowdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023378" comment="java-17-openjdk-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023379" comment="java-17-openjdk-headless-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023380" comment="java-17-openjdk-headless-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023381" comment="java-17-openjdk-headless-slowdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023382" comment="java-17-openjdk-javadoc-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023383" comment="java-17-openjdk-javadoc-zip-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023384" comment="java-17-openjdk-jmods-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023385" comment="java-17-openjdk-jmods-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023386" comment="java-17-openjdk-jmods-slowdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023387" comment="java-17-openjdk-slowdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023388" comment="java-17-openjdk-src-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023389" comment="java-17-openjdk-src-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023390" comment="java-17-openjdk-src-slowdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023391" comment="java-17-openjdk-static-libs-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023392" comment="java-17-openjdk-static-libs-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023393" comment="java-17-openjdk-static-libs-slowdebug-17.0.17.0.10-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4608" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<reference ref_id="CVE-2025-61748" ref_url="https://www.suse.com/security/cve/CVE-2025-61748/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18824.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18824.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61748/">CVE-2025-61748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61748">CVE-2025-61748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023394" comment="java-21-openjdk-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023395" comment="java-21-openjdk-demo-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023396" comment="java-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023397" comment="java-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023398" comment="java-21-openjdk-devel-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023399" comment="java-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023400" comment="java-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023401" comment="java-21-openjdk-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023402" comment="java-21-openjdk-headless-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023403" comment="java-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023404" comment="java-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023405" comment="java-21-openjdk-javadoc-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023406" comment="java-21-openjdk-javadoc-zip-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023407" comment="java-21-openjdk-jmods-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023408" comment="java-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023409" comment="java-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023410" comment="java-21-openjdk-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023411" comment="java-21-openjdk-src-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023412" comment="java-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023413" comment="java-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023414" comment="java-21-openjdk-static-libs-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023415" comment="java-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023416" comment="java-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4609" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-53331" ref_url="https://www.suse.com/security/cve/CVE-2023-53331/" source="CVE"/>
		<reference ref_id="CVE-2025-22122" ref_url="https://www.suse.com/security/cve/CVE-2025-22122/" source="CVE"/>
		<reference ref_id="CVE-2025-39718" ref_url="https://www.suse.com/security/cve/CVE-2025-39718/" source="CVE"/>
		<reference ref_id="CVE-2025-39730" ref_url="https://www.suse.com/security/cve/CVE-2025-39730/" source="CVE"/>
		<reference ref_id="CVE-2025-39751" ref_url="https://www.suse.com/security/cve/CVE-2025-39751/" source="CVE"/>
		<reference ref_id="CVE-2025-39819" ref_url="https://www.suse.com/security/cve/CVE-2025-39819/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19105.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19105.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53331/">CVE-2023-53331 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53331">CVE-2023-53331 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22122/">CVE-2025-22122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22122">CVE-2025-22122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39718/">CVE-2025-39718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39718">CVE-2025-39718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39730/">CVE-2025-39730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39730">CVE-2025-39730 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39751/">CVE-2025-39751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39819/">CVE-2025-39819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39819">CVE-2025-39819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024258" comment="kernel-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024259" comment="kernel-abi-stablelists-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024260" comment="kernel-core-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024261" comment="kernel-cross-headers-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024262" comment="kernel-debug-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024263" comment="kernel-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024266" comment="kernel-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024267" comment="kernel-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024268" comment="kernel-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024269" comment="kernel-debug-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024272" comment="kernel-doc-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024273" comment="kernel-headers-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024274" comment="kernel-modules-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024275" comment="kernel-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024276" comment="kernel-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024277" comment="kernel-rt-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024278" comment="kernel-rt-core-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024279" comment="kernel-rt-debug-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024280" comment="kernel-rt-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024282" comment="kernel-rt-debug-kvm-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024283" comment="kernel-rt-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024284" comment="kernel-rt-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024285" comment="kernel-rt-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024287" comment="kernel-rt-kvm-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024288" comment="kernel-rt-modules-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024289" comment="kernel-rt-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024290" comment="kernel-rt-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024291" comment="kernel-tools-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024292" comment="kernel-tools-libs-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024294" comment="kernel-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024295" comment="kernel-uki-virt-addons-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024296" comment="libperf-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024297" comment="perf-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024298" comment="python3-perf-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024299" comment="rtla-5.14.0-570.58.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024300" comment="rv-5.14.0-570.58.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4610" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-8176" ref_url="https://www.suse.com/security/cve/CVE-2025-8176/" source="CVE"/>
		<reference ref_id="CVE-2025-9900" ref_url="https://www.suse.com/security/cve/CVE-2025-9900/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19113.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19113.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8176/">CVE-2025-8176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8176">CVE-2025-8176 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9900/">CVE-2025-9900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9900">CVE-2025-9900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023929" comment="libtiff-4.4.0-13.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023930" comment="libtiff-devel-4.4.0-13.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023931" comment="libtiff-tools-4.4.0-13.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4611" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-1244" ref_url="https://www.suse.com/security/cve/CVE-2025-1244/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1915.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1915.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1244/">CVE-2025-1244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1244">CVE-2025-1244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967154" comment="emacs-27.2-11.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967155" comment="emacs-common-27.2-11.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967156" comment="emacs-filesystem-27.2-11.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967157" comment="emacs-lucid-27.2-11.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967158" comment="emacs-nox-27.2-11.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4612" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-46817" ref_url="https://www.suse.com/security/cve/CVE-2025-46817/" source="CVE"/>
		<reference ref_id="CVE-2025-46818" ref_url="https://www.suse.com/security/cve/CVE-2025-46818/" source="CVE"/>
		<reference ref_id="CVE-2025-46819" ref_url="https://www.suse.com/security/cve/CVE-2025-46819/" source="CVE"/>
		<reference ref_id="CVE-2025-49844" ref_url="https://www.suse.com/security/cve/CVE-2025-49844/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19237.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19237.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46817/">CVE-2025-46817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817">CVE-2025-46817 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46818/">CVE-2025-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818">CVE-2025-46818 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46819/">CVE-2025-46819 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819">CVE-2025-46819 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-49844/">CVE-2025-49844 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844">CVE-2025-49844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024455" comment="redis-6.2.20-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024456" comment="redis-devel-6.2.20-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024457" comment="redis-doc-6.2.20-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4613" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-46817" ref_url="https://www.suse.com/security/cve/CVE-2025-46817/" source="CVE"/>
		<reference ref_id="CVE-2025-46818" ref_url="https://www.suse.com/security/cve/CVE-2025-46818/" source="CVE"/>
		<reference ref_id="CVE-2025-46819" ref_url="https://www.suse.com/security/cve/CVE-2025-46819/" source="CVE"/>
		<reference ref_id="CVE-2025-49844" ref_url="https://www.suse.com/security/cve/CVE-2025-49844/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19345.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19345.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46817/">CVE-2025-46817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817">CVE-2025-46817 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46818/">CVE-2025-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818">CVE-2025-46818 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46819/">CVE-2025-46819 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819">CVE-2025-46819 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-49844/">CVE-2025-49844 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844">CVE-2025-49844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024458" comment="redis-7.2.11-1.module+el9.6.0+23552+a3d3d132 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024459" comment="redis-devel-7.2.11-1.module+el9.6.0+23552+a3d3d132 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024460" comment="redis-doc-7.2.11-1.module+el9.6.0+23552+a3d3d132 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4614" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-50367" ref_url="https://www.suse.com/security/cve/CVE-2022-50367/" source="CVE"/>
		<reference ref_id="CVE-2023-53494" ref_url="https://www.suse.com/security/cve/CVE-2023-53494/" source="CVE"/>
		<reference ref_id="CVE-2025-39702" ref_url="https://www.suse.com/security/cve/CVE-2025-39702/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19409.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19409.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50367/">CVE-2022-50367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50367">CVE-2022-50367 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53494/">CVE-2023-53494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53494">CVE-2023-53494 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39702/">CVE-2025-39702 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39702">CVE-2025-39702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024764" comment="kernel-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024765" comment="kernel-abi-stablelists-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024766" comment="kernel-core-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024767" comment="kernel-cross-headers-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024768" comment="kernel-debug-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024769" comment="kernel-debug-core-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024772" comment="kernel-debug-modules-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024773" comment="kernel-debug-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024774" comment="kernel-debug-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024775" comment="kernel-debug-uki-virt-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024778" comment="kernel-doc-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024779" comment="kernel-headers-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024780" comment="kernel-modules-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024781" comment="kernel-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024782" comment="kernel-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024783" comment="kernel-rt-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024784" comment="kernel-rt-core-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024785" comment="kernel-rt-debug-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024786" comment="kernel-rt-debug-core-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024788" comment="kernel-rt-debug-kvm-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024789" comment="kernel-rt-debug-modules-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024790" comment="kernel-rt-debug-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024791" comment="kernel-rt-debug-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024793" comment="kernel-rt-kvm-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024794" comment="kernel-rt-modules-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024795" comment="kernel-rt-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024796" comment="kernel-rt-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024797" comment="kernel-tools-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024798" comment="kernel-tools-libs-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024800" comment="kernel-uki-virt-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024801" comment="kernel-uki-virt-addons-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024802" comment="libperf-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024803" comment="perf-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024804" comment="python3-perf-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024805" comment="rtla-5.14.0-570.60.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024806" comment="rv-5.14.0-570.60.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4615" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229/" source="CVE"/>
		<reference ref_id="CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230/" source="CVE"/>
		<reference ref_id="CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19433.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19433.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024807" comment="xorg-x11-server-Xdmx-1.20.11-32.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024808" comment="xorg-x11-server-Xephyr-1.20.11-32.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024809" comment="xorg-x11-server-Xnest-1.20.11-32.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024810" comment="xorg-x11-server-Xorg-1.20.11-32.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024811" comment="xorg-x11-server-Xvfb-1.20.11-32.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024812" comment="xorg-x11-server-common-1.20.11-32.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024813" comment="xorg-x11-server-devel-1.20.11-32.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024814" comment="xorg-x11-server-source-1.20.11-32.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4616" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229/" source="CVE"/>
		<reference ref_id="CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230/" source="CVE"/>
		<reference ref_id="CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19489.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19489.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024815" comment="tigervnc-1.14.1-9.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024816" comment="tigervnc-icons-1.14.1-9.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024817" comment="tigervnc-license-1.14.1-9.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024818" comment="tigervnc-selinux-1.14.1-9.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024819" comment="tigervnc-server-1.14.1-9.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024820" comment="tigervnc-server-minimal-1.14.1-9.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024821" comment="tigervnc-server-module-1.14.1-9.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4617" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-59830" ref_url="https://www.suse.com/security/cve/CVE-2025-59830/" source="CVE"/>
		<reference ref_id="CVE-2025-61770" ref_url="https://www.suse.com/security/cve/CVE-2025-61770/" source="CVE"/>
		<reference ref_id="CVE-2025-61771" ref_url="https://www.suse.com/security/cve/CVE-2025-61771/" source="CVE"/>
		<reference ref_id="CVE-2025-61772" ref_url="https://www.suse.com/security/cve/CVE-2025-61772/" source="CVE"/>
		<reference ref_id="CVE-2025-61919" ref_url="https://www.suse.com/security/cve/CVE-2025-61919/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19512.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19512.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-59830/">CVE-2025-59830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59830">CVE-2025-59830 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61770/">CVE-2025-61770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61770">CVE-2025-61770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61771/">CVE-2025-61771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61771">CVE-2025-61771 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61772/">CVE-2025-61772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61772">CVE-2025-61772 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61919/">CVE-2025-61919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61919">CVE-2025-61919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024822" comment="pcs-0.11.9-2.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024823" comment="pcs-snmp-0.11.9-2.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4618" version="1" class="patch">
	<metadata>
		<title>security update for galera (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-52969" ref_url="https://www.suse.com/security/cve/CVE-2023-52969/" source="CVE"/>
		<reference ref_id="CVE-2023-52970" ref_url="https://www.suse.com/security/cve/CVE-2023-52970/" source="CVE"/>
		<reference ref_id="CVE-2025-21490" ref_url="https://www.suse.com/security/cve/CVE-2025-21490/" source="CVE"/>
		<reference ref_id="CVE-2025-30693" ref_url="https://www.suse.com/security/cve/CVE-2025-30693/" source="CVE"/>
		<reference ref_id="CVE-2025-30722" ref_url="https://www.suse.com/security/cve/CVE-2025-30722/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19584.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19584.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52969/">CVE-2023-52969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52969">CVE-2023-52969 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52970/">CVE-2023-52970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52970">CVE-2023-52970 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21490/">CVE-2025-21490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21490">CVE-2025-21490 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-30693/">CVE-2025-30693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30693">CVE-2025-30693 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30722/">CVE-2025-30722 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30722">CVE-2025-30722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024824" comment="galera-26.4.22-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024825" comment="mariadb-10.5.29-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024826" comment="mariadb-backup-10.5.29-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024827" comment="mariadb-common-10.5.29-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024828" comment="mariadb-devel-10.5.29-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024829" comment="mariadb-embedded-10.5.29-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024830" comment="mariadb-embedded-devel-10.5.29-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024831" comment="mariadb-errmsg-10.5.29-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024832" comment="mariadb-gssapi-server-10.5.29-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024833" comment="mariadb-oqgraph-engine-10.5.29-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024834" comment="mariadb-pam-10.5.29-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024835" comment="mariadb-server-10.5.29-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024836" comment="mariadb-server-galera-10.5.29-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024837" comment="mariadb-server-utils-10.5.29-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024838" comment="mariadb-test-10.5.29-2.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4619" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server-Xwayland (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229/" source="CVE"/>
		<reference ref_id="CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230/" source="CVE"/>
		<reference ref_id="CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19623.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19623.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024839" comment="xorg-x11-server-Xwayland-23.2.7-5.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024840" comment="xorg-x11-server-Xwayland-devel-23.2.7-5.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4620" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-11021" ref_url="https://www.suse.com/security/cve/CVE-2025-11021/" source="CVE"/>
		<reference ref_id="CVE-2025-4945" ref_url="https://www.suse.com/security/cve/CVE-2025-4945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19713.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19713.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11021/">CVE-2025-11021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11021">CVE-2025-11021 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4945/">CVE-2025-4945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4945">CVE-2025-4945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024841" comment="libsoup-2.72.0-10.el9_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024842" comment="libsoup-devel-2.72.0-10.el9_6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4621" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qt3d (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-11277" ref_url="https://www.suse.com/security/cve/CVE-2025-11277/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19911.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19911.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11277/">CVE-2025-11277 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11277">CVE-2025-11277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025602" comment="qt5-qt3d-5.15.9-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025603" comment="qt5-qt3d-devel-5.15.9-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025604" comment="qt5-qt3d-examples-5.15.9-2.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4622" version="1" class="patch">
	<metadata>
		<title>security update for runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133/" source="CVE"/>
		<reference ref_id="CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565/" source="CVE"/>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19927.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19927.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025605" comment="runc-1.2.5-3.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4623" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-36350" ref_url="https://www.suse.com/security/cve/CVE-2024-36350/" source="CVE"/>
		<reference ref_id="CVE-2024-36357" ref_url="https://www.suse.com/security/cve/CVE-2024-36357/" source="CVE"/>
		<reference ref_id="CVE-2025-40300" ref_url="https://www.suse.com/security/cve/CVE-2025-40300/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19930.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19930.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36350/">CVE-2024-36350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36350">CVE-2024-36350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36357/">CVE-2024-36357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36357">CVE-2024-36357 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40300/">CVE-2025-40300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025606" comment="kernel-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025607" comment="kernel-abi-stablelists-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025608" comment="kernel-core-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025609" comment="kernel-cross-headers-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025610" comment="kernel-debug-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025611" comment="kernel-debug-core-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025614" comment="kernel-debug-modules-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025615" comment="kernel-debug-modules-core-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025616" comment="kernel-debug-modules-extra-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025617" comment="kernel-debug-uki-virt-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025620" comment="kernel-doc-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025621" comment="kernel-headers-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025622" comment="kernel-modules-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025623" comment="kernel-modules-core-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025624" comment="kernel-modules-extra-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025625" comment="kernel-rt-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025626" comment="kernel-rt-core-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025627" comment="kernel-rt-debug-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025628" comment="kernel-rt-debug-core-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025630" comment="kernel-rt-debug-kvm-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025631" comment="kernel-rt-debug-modules-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025632" comment="kernel-rt-debug-modules-core-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025633" comment="kernel-rt-debug-modules-extra-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025635" comment="kernel-rt-kvm-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025636" comment="kernel-rt-modules-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025637" comment="kernel-rt-modules-core-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025638" comment="kernel-rt-modules-extra-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025639" comment="kernel-tools-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025640" comment="kernel-tools-libs-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025642" comment="kernel-uki-virt-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025643" comment="kernel-uki-virt-addons-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025644" comment="libperf-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025645" comment="perf-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025646" comment="python3-perf-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025647" comment="rtla-5.14.0-570.62.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025648" comment="rv-5.14.0-570.62.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4624" version="1" class="patch">
	<metadata>
		<title>security update for bind9.18 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-40778" ref_url="https://www.suse.com/security/cve/CVE-2025-40778/" source="CVE"/>
		<reference ref_id="CVE-2025-40780" ref_url="https://www.suse.com/security/cve/CVE-2025-40780/" source="CVE"/>
		<reference ref_id="CVE-2025-8677" ref_url="https://www.suse.com/security/cve/CVE-2025-8677/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19950.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19950.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40778/">CVE-2025-40778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778">CVE-2025-40778 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40780/">CVE-2025-40780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40780">CVE-2025-40780 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8677/">CVE-2025-8677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8677">CVE-2025-8677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025649" comment="bind9.18-9.18.29-4.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025650" comment="bind9.18-chroot-9.18.29-4.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025651" comment="bind9.18-devel-9.18.29-4.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025652" comment="bind9.18-dnssec-utils-9.18.29-4.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025653" comment="bind9.18-doc-9.18.29-4.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025654" comment="bind9.18-libs-9.18.29-4.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025655" comment="bind9.18-utils-9.18.29-4.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4625" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-40778" ref_url="https://www.suse.com/security/cve/CVE-2025-40778/" source="CVE"/>
		<reference ref_id="CVE-2025-40780" ref_url="https://www.suse.com/security/cve/CVE-2025-40780/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19951.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19951.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40778/">CVE-2025-40778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778">CVE-2025-40778 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40780/">CVE-2025-40780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40780">CVE-2025-40780 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025656" comment="bind-9.16.23-31.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025657" comment="bind-chroot-9.16.23-31.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025658" comment="bind-devel-9.16.23-31.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025659" comment="bind-dnssec-doc-9.16.23-31.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025660" comment="bind-dnssec-utils-9.16.23-31.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025661" comment="bind-doc-9.16.23-31.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025662" comment="bind-libs-9.16.23-31.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025663" comment="bind-license-9.16.23-31.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025664" comment="bind-utils-9.16.23-31.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025665" comment="python3-bind-9.16.23-31.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4626" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-54543" ref_url="https://www.suse.com/security/cve/CVE-2024-54543/" source="CVE"/>
		<reference ref_id="CVE-2025-24162" ref_url="https://www.suse.com/security/cve/CVE-2025-24162/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2035.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2035.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54543/">CVE-2024-54543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54543">CVE-2024-54543 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24162/">CVE-2025-24162 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24162">CVE-2025-24162 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967159" comment="webkit2gtk3-2.46.6-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967160" comment="webkit2gtk3-devel-2.46.6-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967161" comment="webkit2gtk3-jsc-2.46.6-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967162" comment="webkit2gtk3-jsc-devel-2.46.6-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4627" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-48830" ref_url="https://www.suse.com/security/cve/CVE-2022-48830/" source="CVE"/>
		<reference ref_id="CVE-2022-49024" ref_url="https://www.suse.com/security/cve/CVE-2022-49024/" source="CVE"/>
		<reference ref_id="CVE-2022-49269" ref_url="https://www.suse.com/security/cve/CVE-2022-49269/" source="CVE"/>
		<reference ref_id="CVE-2022-49353" ref_url="https://www.suse.com/security/cve/CVE-2022-49353/" source="CVE"/>
		<reference ref_id="CVE-2022-49357" ref_url="https://www.suse.com/security/cve/CVE-2022-49357/" source="CVE"/>
		<reference ref_id="CVE-2022-49432" ref_url="https://www.suse.com/security/cve/CVE-2022-49432/" source="CVE"/>
		<reference ref_id="CVE-2022-49437" ref_url="https://www.suse.com/security/cve/CVE-2022-49437/" source="CVE"/>
		<reference ref_id="CVE-2022-49443" ref_url="https://www.suse.com/security/cve/CVE-2022-49443/" source="CVE"/>
		<reference ref_id="CVE-2022-49623" ref_url="https://www.suse.com/security/cve/CVE-2022-49623/" source="CVE"/>
		<reference ref_id="CVE-2022-49627" ref_url="https://www.suse.com/security/cve/CVE-2022-49627/" source="CVE"/>
		<reference ref_id="CVE-2022-49643" ref_url="https://www.suse.com/security/cve/CVE-2022-49643/" source="CVE"/>
		<reference ref_id="CVE-2022-49648" ref_url="https://www.suse.com/security/cve/CVE-2022-49648/" source="CVE"/>
		<reference ref_id="CVE-2022-49657" ref_url="https://www.suse.com/security/cve/CVE-2022-49657/" source="CVE"/>
		<reference ref_id="CVE-2022-49670" ref_url="https://www.suse.com/security/cve/CVE-2022-49670/" source="CVE"/>
		<reference ref_id="CVE-2022-49672" ref_url="https://www.suse.com/security/cve/CVE-2022-49672/" source="CVE"/>
		<reference ref_id="CVE-2022-49845" ref_url="https://www.suse.com/security/cve/CVE-2022-49845/" source="CVE"/>
		<reference ref_id="CVE-2022-50143" ref_url="https://www.suse.com/security/cve/CVE-2022-50143/" source="CVE"/>
		<reference ref_id="CVE-2024-36350" ref_url="https://www.suse.com/security/cve/CVE-2024-36350/" source="CVE"/>
		<reference ref_id="CVE-2024-36357" ref_url="https://www.suse.com/security/cve/CVE-2024-36357/" source="CVE"/>
		<reference ref_id="CVE-2024-46689" ref_url="https://www.suse.com/security/cve/CVE-2024-46689/" source="CVE"/>
		<reference ref_id="CVE-2024-46744" ref_url="https://www.suse.com/security/cve/CVE-2024-46744/" source="CVE"/>
		<reference ref_id="CVE-2024-47679" ref_url="https://www.suse.com/security/cve/CVE-2024-47679/" source="CVE"/>
		<reference ref_id="CVE-2024-47727" ref_url="https://www.suse.com/security/cve/CVE-2024-47727/" source="CVE"/>
		<reference ref_id="CVE-2024-49570" ref_url="https://www.suse.com/security/cve/CVE-2024-49570/" source="CVE"/>
		<reference ref_id="CVE-2024-49864" ref_url="https://www.suse.com/security/cve/CVE-2024-49864/" source="CVE"/>
		<reference ref_id="CVE-2024-50060" ref_url="https://www.suse.com/security/cve/CVE-2024-50060/" source="CVE"/>
		<reference ref_id="CVE-2024-50195" ref_url="https://www.suse.com/security/cve/CVE-2024-50195/" source="CVE"/>
		<reference ref_id="CVE-2024-50294" ref_url="https://www.suse.com/security/cve/CVE-2024-50294/" source="CVE"/>
		<reference ref_id="CVE-2024-52332" ref_url="https://www.suse.com/security/cve/CVE-2024-52332/" source="CVE"/>
		<reference ref_id="CVE-2024-53052" ref_url="https://www.suse.com/security/cve/CVE-2024-53052/" source="CVE"/>
		<reference ref_id="CVE-2024-53090" ref_url="https://www.suse.com/security/cve/CVE-2024-53090/" source="CVE"/>
		<reference ref_id="CVE-2024-53119" ref_url="https://www.suse.com/security/cve/CVE-2024-53119/" source="CVE"/>
		<reference ref_id="CVE-2024-53135" ref_url="https://www.suse.com/security/cve/CVE-2024-53135/" source="CVE"/>
		<reference ref_id="CVE-2024-53170" ref_url="https://www.suse.com/security/cve/CVE-2024-53170/" source="CVE"/>
		<reference ref_id="CVE-2024-53229" ref_url="https://www.suse.com/security/cve/CVE-2024-53229/" source="CVE"/>
		<reference ref_id="CVE-2024-53241" ref_url="https://www.suse.com/security/cve/CVE-2024-53241/" source="CVE"/>
		<reference ref_id="CVE-2024-53680" ref_url="https://www.suse.com/security/cve/CVE-2024-53680/" source="CVE"/>
		<reference ref_id="CVE-2024-54456" ref_url="https://www.suse.com/security/cve/CVE-2024-54456/" source="CVE"/>
		<reference ref_id="CVE-2024-56603" ref_url="https://www.suse.com/security/cve/CVE-2024-56603/" source="CVE"/>
		<reference ref_id="CVE-2024-56645" ref_url="https://www.suse.com/security/cve/CVE-2024-56645/" source="CVE"/>
		<reference ref_id="CVE-2024-56662" ref_url="https://www.suse.com/security/cve/CVE-2024-56662/" source="CVE"/>
		<reference ref_id="CVE-2024-56672" ref_url="https://www.suse.com/security/cve/CVE-2024-56672/" source="CVE"/>
		<reference ref_id="CVE-2024-56675" ref_url="https://www.suse.com/security/cve/CVE-2024-56675/" source="CVE"/>
		<reference ref_id="CVE-2024-56690" ref_url="https://www.suse.com/security/cve/CVE-2024-56690/" source="CVE"/>
		<reference ref_id="CVE-2024-56709" ref_url="https://www.suse.com/security/cve/CVE-2024-56709/" source="CVE"/>
		<reference ref_id="CVE-2024-56739" ref_url="https://www.suse.com/security/cve/CVE-2024-56739/" source="CVE"/>
		<reference ref_id="CVE-2024-56786" ref_url="https://www.suse.com/security/cve/CVE-2024-56786/" source="CVE"/>
		<reference ref_id="CVE-2024-57981" ref_url="https://www.suse.com/security/cve/CVE-2024-57981/" source="CVE"/>
		<reference ref_id="CVE-2024-57986" ref_url="https://www.suse.com/security/cve/CVE-2024-57986/" source="CVE"/>
		<reference ref_id="CVE-2024-57987" ref_url="https://www.suse.com/security/cve/CVE-2024-57987/" source="CVE"/>
		<reference ref_id="CVE-2024-57988" ref_url="https://www.suse.com/security/cve/CVE-2024-57988/" source="CVE"/>
		<reference ref_id="CVE-2024-57989" ref_url="https://www.suse.com/security/cve/CVE-2024-57989/" source="CVE"/>
		<reference ref_id="CVE-2024-57990" ref_url="https://www.suse.com/security/cve/CVE-2024-57990/" source="CVE"/>
		<reference ref_id="CVE-2024-57993" ref_url="https://www.suse.com/security/cve/CVE-2024-57993/" source="CVE"/>
		<reference ref_id="CVE-2024-57995" ref_url="https://www.suse.com/security/cve/CVE-2024-57995/" source="CVE"/>
		<reference ref_id="CVE-2024-57998" ref_url="https://www.suse.com/security/cve/CVE-2024-57998/" source="CVE"/>
		<reference ref_id="CVE-2024-58012" ref_url="https://www.suse.com/security/cve/CVE-2024-58012/" source="CVE"/>
		<reference ref_id="CVE-2024-58014" ref_url="https://www.suse.com/security/cve/CVE-2024-58014/" source="CVE"/>
		<reference ref_id="CVE-2024-58015" ref_url="https://www.suse.com/security/cve/CVE-2024-58015/" source="CVE"/>
		<reference ref_id="CVE-2024-58057" ref_url="https://www.suse.com/security/cve/CVE-2024-58057/" source="CVE"/>
		<reference ref_id="CVE-2024-58062" ref_url="https://www.suse.com/security/cve/CVE-2024-58062/" source="CVE"/>
		<reference ref_id="CVE-2024-58068" ref_url="https://www.suse.com/security/cve/CVE-2024-58068/" source="CVE"/>
		<reference ref_id="CVE-2024-58072" ref_url="https://www.suse.com/security/cve/CVE-2024-58072/" source="CVE"/>
		<reference ref_id="CVE-2024-58075" ref_url="https://www.suse.com/security/cve/CVE-2024-58075/" source="CVE"/>
		<reference ref_id="CVE-2024-58077" ref_url="https://www.suse.com/security/cve/CVE-2024-58077/" source="CVE"/>
		<reference ref_id="CVE-2024-58083" ref_url="https://www.suse.com/security/cve/CVE-2024-58083/" source="CVE"/>
		<reference ref_id="CVE-2024-58088" ref_url="https://www.suse.com/security/cve/CVE-2024-58088/" source="CVE"/>
		<reference ref_id="CVE-2025-21631" ref_url="https://www.suse.com/security/cve/CVE-2025-21631/" source="CVE"/>
		<reference ref_id="CVE-2025-21647" ref_url="https://www.suse.com/security/cve/CVE-2025-21647/" source="CVE"/>
		<reference ref_id="CVE-2025-21648" ref_url="https://www.suse.com/security/cve/CVE-2025-21648/" source="CVE"/>
		<reference ref_id="CVE-2025-21671" ref_url="https://www.suse.com/security/cve/CVE-2025-21671/" source="CVE"/>
		<reference ref_id="CVE-2025-21672" ref_url="https://www.suse.com/security/cve/CVE-2025-21672/" source="CVE"/>
		<reference ref_id="CVE-2025-21691" ref_url="https://www.suse.com/security/cve/CVE-2025-21691/" source="CVE"/>
		<reference ref_id="CVE-2025-21693" ref_url="https://www.suse.com/security/cve/CVE-2025-21693/" source="CVE"/>
		<reference ref_id="CVE-2025-21696" ref_url="https://www.suse.com/security/cve/CVE-2025-21696/" source="CVE"/>
		<reference ref_id="CVE-2025-21702" ref_url="https://www.suse.com/security/cve/CVE-2025-21702/" source="CVE"/>
		<reference ref_id="CVE-2025-21714" ref_url="https://www.suse.com/security/cve/CVE-2025-21714/" source="CVE"/>
		<reference ref_id="CVE-2025-21726" ref_url="https://www.suse.com/security/cve/CVE-2025-21726/" source="CVE"/>
		<reference ref_id="CVE-2025-21728" ref_url="https://www.suse.com/security/cve/CVE-2025-21728/" source="CVE"/>
		<reference ref_id="CVE-2025-21729" ref_url="https://www.suse.com/security/cve/CVE-2025-21729/" source="CVE"/>
		<reference ref_id="CVE-2025-21738" ref_url="https://www.suse.com/security/cve/CVE-2025-21738/" source="CVE"/>
		<reference ref_id="CVE-2025-21739" ref_url="https://www.suse.com/security/cve/CVE-2025-21739/" source="CVE"/>
		<reference ref_id="CVE-2025-21745" ref_url="https://www.suse.com/security/cve/CVE-2025-21745/" source="CVE"/>
		<reference ref_id="CVE-2025-21746" ref_url="https://www.suse.com/security/cve/CVE-2025-21746/" source="CVE"/>
		<reference ref_id="CVE-2025-21765" ref_url="https://www.suse.com/security/cve/CVE-2025-21765/" source="CVE"/>
		<reference ref_id="CVE-2025-21786" ref_url="https://www.suse.com/security/cve/CVE-2025-21786/" source="CVE"/>
		<reference ref_id="CVE-2025-21787" ref_url="https://www.suse.com/security/cve/CVE-2025-21787/" source="CVE"/>
		<reference ref_id="CVE-2025-21790" ref_url="https://www.suse.com/security/cve/CVE-2025-21790/" source="CVE"/>
		<reference ref_id="CVE-2025-21791" ref_url="https://www.suse.com/security/cve/CVE-2025-21791/" source="CVE"/>
		<reference ref_id="CVE-2025-21795" ref_url="https://www.suse.com/security/cve/CVE-2025-21795/" source="CVE"/>
		<reference ref_id="CVE-2025-21796" ref_url="https://www.suse.com/security/cve/CVE-2025-21796/" source="CVE"/>
		<reference ref_id="CVE-2025-21806" ref_url="https://www.suse.com/security/cve/CVE-2025-21806/" source="CVE"/>
		<reference ref_id="CVE-2025-21826" ref_url="https://www.suse.com/security/cve/CVE-2025-21826/" source="CVE"/>
		<reference ref_id="CVE-2025-21828" ref_url="https://www.suse.com/security/cve/CVE-2025-21828/" source="CVE"/>
		<reference ref_id="CVE-2025-21829" ref_url="https://www.suse.com/security/cve/CVE-2025-21829/" source="CVE"/>
		<reference ref_id="CVE-2025-21837" ref_url="https://www.suse.com/security/cve/CVE-2025-21837/" source="CVE"/>
		<reference ref_id="CVE-2025-21839" ref_url="https://www.suse.com/security/cve/CVE-2025-21839/" source="CVE"/>
		<reference ref_id="CVE-2025-21844" ref_url="https://www.suse.com/security/cve/CVE-2025-21844/" source="CVE"/>
		<reference ref_id="CVE-2025-21846" ref_url="https://www.suse.com/security/cve/CVE-2025-21846/" source="CVE"/>
		<reference ref_id="CVE-2025-21847" ref_url="https://www.suse.com/security/cve/CVE-2025-21847/" source="CVE"/>
		<reference ref_id="CVE-2025-21848" ref_url="https://www.suse.com/security/cve/CVE-2025-21848/" source="CVE"/>
		<reference ref_id="CVE-2025-21851" ref_url="https://www.suse.com/security/cve/CVE-2025-21851/" source="CVE"/>
		<reference ref_id="CVE-2025-21853" ref_url="https://www.suse.com/security/cve/CVE-2025-21853/" source="CVE"/>
		<reference ref_id="CVE-2025-21855" ref_url="https://www.suse.com/security/cve/CVE-2025-21855/" source="CVE"/>
		<reference ref_id="CVE-2025-21861" ref_url="https://www.suse.com/security/cve/CVE-2025-21861/" source="CVE"/>
		<reference ref_id="CVE-2025-21863" ref_url="https://www.suse.com/security/cve/CVE-2025-21863/" source="CVE"/>
		<reference ref_id="CVE-2025-21864" ref_url="https://www.suse.com/security/cve/CVE-2025-21864/" source="CVE"/>
		<reference ref_id="CVE-2025-21902" ref_url="https://www.suse.com/security/cve/CVE-2025-21902/" source="CVE"/>
		<reference ref_id="CVE-2025-22056" ref_url="https://www.suse.com/security/cve/CVE-2025-22056/" source="CVE"/>
		<reference ref_id="CVE-2025-22086" ref_url="https://www.suse.com/security/cve/CVE-2025-22086/" source="CVE"/>
		<reference ref_id="CVE-2025-22089" ref_url="https://www.suse.com/security/cve/CVE-2025-22089/" source="CVE"/>
		<reference ref_id="CVE-2025-22092" ref_url="https://www.suse.com/security/cve/CVE-2025-22092/" source="CVE"/>
		<reference ref_id="CVE-2025-22097" ref_url="https://www.suse.com/security/cve/CVE-2025-22097/" source="CVE"/>
		<reference ref_id="CVE-2025-22111" ref_url="https://www.suse.com/security/cve/CVE-2025-22111/" source="CVE"/>
		<reference ref_id="CVE-2025-22116" ref_url="https://www.suse.com/security/cve/CVE-2025-22116/" source="CVE"/>
		<reference ref_id="CVE-2025-22119" ref_url="https://www.suse.com/security/cve/CVE-2025-22119/" source="CVE"/>
		<reference ref_id="CVE-2025-23129" ref_url="https://www.suse.com/security/cve/CVE-2025-23129/" source="CVE"/>
		<reference ref_id="CVE-2025-37994" ref_url="https://www.suse.com/security/cve/CVE-2025-37994/" source="CVE"/>
		<reference ref_id="CVE-2025-38013" ref_url="https://www.suse.com/security/cve/CVE-2025-38013/" source="CVE"/>
		<reference ref_id="CVE-2025-38075" ref_url="https://www.suse.com/security/cve/CVE-2025-38075/" source="CVE"/>
		<reference ref_id="CVE-2025-38116" ref_url="https://www.suse.com/security/cve/CVE-2025-38116/" source="CVE"/>
		<reference ref_id="CVE-2025-38396" ref_url="https://www.suse.com/security/cve/CVE-2025-38396/" source="CVE"/>
		<reference ref_id="CVE-2025-38438" ref_url="https://www.suse.com/security/cve/CVE-2025-38438/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20518.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20518.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48830/">CVE-2022-48830 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48830">CVE-2022-48830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49024/">CVE-2022-49024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49024">CVE-2022-49024 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49269/">CVE-2022-49269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49269">CVE-2022-49269 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49353/">CVE-2022-49353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49353">CVE-2022-49353 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49357/">CVE-2022-49357 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49357">CVE-2022-49357 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49432/">CVE-2022-49432 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49432">CVE-2022-49432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49437/">CVE-2022-49437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49437">CVE-2022-49437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49443/">CVE-2022-49443 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49443">CVE-2022-49443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49623/">CVE-2022-49623 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49623">CVE-2022-49623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49627/">CVE-2022-49627 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49627">CVE-2022-49627 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49643/">CVE-2022-49643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49643">CVE-2022-49643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49648/">CVE-2022-49648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49648">CVE-2022-49648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49657/">CVE-2022-49657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49657">CVE-2022-49657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49670/">CVE-2022-49670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49670">CVE-2022-49670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49672/">CVE-2022-49672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49672">CVE-2022-49672 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49845/">CVE-2022-49845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49845">CVE-2022-49845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50143/">CVE-2022-50143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50143">CVE-2022-50143 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36350/">CVE-2024-36350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36350">CVE-2024-36350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36357/">CVE-2024-36357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36357">CVE-2024-36357 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46689/">CVE-2024-46689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46689">CVE-2024-46689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46744/">CVE-2024-46744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46744">CVE-2024-46744 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47679/">CVE-2024-47679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47679">CVE-2024-47679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47727/">CVE-2024-47727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47727">CVE-2024-47727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49570/">CVE-2024-49570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49570">CVE-2024-49570 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49864/">CVE-2024-49864 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49864">CVE-2024-49864 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50060/">CVE-2024-50060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50060">CVE-2024-50060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50195/">CVE-2024-50195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50195">CVE-2024-50195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50294/">CVE-2024-50294 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50294">CVE-2024-50294 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52332/">CVE-2024-52332 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-53052/">CVE-2024-53052 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53052">CVE-2024-53052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53090/">CVE-2024-53090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53090">CVE-2024-53090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53119/">CVE-2024-53119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53119">CVE-2024-53119 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53135/">CVE-2024-53135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53135">CVE-2024-53135 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53170/">CVE-2024-53170 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53170">CVE-2024-53170 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53229/">CVE-2024-53229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53229">CVE-2024-53229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53241/">CVE-2024-53241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53680/">CVE-2024-53680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54456/">CVE-2024-54456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54456">CVE-2024-54456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56603/">CVE-2024-56603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56645/">CVE-2024-56645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56662/">CVE-2024-56662 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56672/">CVE-2024-56672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56675/">CVE-2024-56675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56690/">CVE-2024-56690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56690">CVE-2024-56690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56709/">CVE-2024-56709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56709">CVE-2024-56709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56739/">CVE-2024-56739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56739">CVE-2024-56739 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56786/">CVE-2024-56786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56786">CVE-2024-56786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57981/">CVE-2024-57981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57981">CVE-2024-57981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57986/">CVE-2024-57986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57986">CVE-2024-57986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57987/">CVE-2024-57987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57987">CVE-2024-57987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57988/">CVE-2024-57988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57988">CVE-2024-57988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57989/">CVE-2024-57989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57989">CVE-2024-57989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57990/">CVE-2024-57990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57990">CVE-2024-57990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57993/">CVE-2024-57993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57993">CVE-2024-57993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57995/">CVE-2024-57995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57995">CVE-2024-57995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57998/">CVE-2024-57998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57998">CVE-2024-57998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58012/">CVE-2024-58012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58012">CVE-2024-58012 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58014/">CVE-2024-58014 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58014">CVE-2024-58014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58015/">CVE-2024-58015 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58015">CVE-2024-58015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58057/">CVE-2024-58057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58057">CVE-2024-58057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58062/">CVE-2024-58062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58062">CVE-2024-58062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58068/">CVE-2024-58068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58068">CVE-2024-58068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58072/">CVE-2024-58072 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58072">CVE-2024-58072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58075/">CVE-2024-58075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58075">CVE-2024-58075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58077/">CVE-2024-58077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58077">CVE-2024-58077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58083/">CVE-2024-58083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58083">CVE-2024-58083 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58088/">CVE-2024-58088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58088">CVE-2024-58088 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21631/">CVE-2025-21631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21631">CVE-2025-21631 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21647/">CVE-2025-21647 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21647">CVE-2025-21647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21648/">CVE-2025-21648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21648">CVE-2025-21648 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21671/">CVE-2025-21671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21671">CVE-2025-21671 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21672/">CVE-2025-21672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21672">CVE-2025-21672 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21691/">CVE-2025-21691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21691">CVE-2025-21691 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21693/">CVE-2025-21693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21693">CVE-2025-21693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21696/">CVE-2025-21696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21696">CVE-2025-21696 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21702/">CVE-2025-21702 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21702">CVE-2025-21702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21714/">CVE-2025-21714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21714">CVE-2025-21714 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21726/">CVE-2025-21726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21726">CVE-2025-21726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21728/">CVE-2025-21728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21728">CVE-2025-21728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21729/">CVE-2025-21729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21729">CVE-2025-21729 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21738/">CVE-2025-21738 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21738">CVE-2025-21738 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21739/">CVE-2025-21739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21739">CVE-2025-21739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21745/">CVE-2025-21745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21745">CVE-2025-21745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21746/">CVE-2025-21746 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21746">CVE-2025-21746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21765/">CVE-2025-21765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21765">CVE-2025-21765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21786/">CVE-2025-21786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21786">CVE-2025-21786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21787/">CVE-2025-21787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21787">CVE-2025-21787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21790/">CVE-2025-21790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21790">CVE-2025-21790 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21791/">CVE-2025-21791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21791">CVE-2025-21791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21795/">CVE-2025-21795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21795">CVE-2025-21795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21796/">CVE-2025-21796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21796">CVE-2025-21796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21806/">CVE-2025-21806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21806">CVE-2025-21806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21826/">CVE-2025-21826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21826">CVE-2025-21826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21828/">CVE-2025-21828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21828">CVE-2025-21828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21829/">CVE-2025-21829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21829">CVE-2025-21829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21837/">CVE-2025-21837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21837">CVE-2025-21837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21839/">CVE-2025-21839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21839">CVE-2025-21839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21844/">CVE-2025-21844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21844">CVE-2025-21844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21846/">CVE-2025-21846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21846">CVE-2025-21846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21847/">CVE-2025-21847 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21847">CVE-2025-21847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21848/">CVE-2025-21848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21848">CVE-2025-21848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21851/">CVE-2025-21851 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21851">CVE-2025-21851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21853/">CVE-2025-21853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21853">CVE-2025-21853 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21855/">CVE-2025-21855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21855">CVE-2025-21855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21861/">CVE-2025-21861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21861">CVE-2025-21861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21863/">CVE-2025-21863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21863">CVE-2025-21863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21864/">CVE-2025-21864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21864">CVE-2025-21864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21902/">CVE-2025-21902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21902">CVE-2025-21902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22056/">CVE-2025-22056 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22056">CVE-2025-22056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22086/">CVE-2025-22086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22086">CVE-2025-22086 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22089/">CVE-2025-22089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22089">CVE-2025-22089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22092/">CVE-2025-22092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22092">CVE-2025-22092 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22097/">CVE-2025-22097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22097">CVE-2025-22097 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22111/">CVE-2025-22111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22111">CVE-2025-22111 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22116/">CVE-2025-22116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22116">CVE-2025-22116 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22119/">CVE-2025-22119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22119">CVE-2025-22119 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23129/">CVE-2025-23129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23129">CVE-2025-23129 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37994/">CVE-2025-37994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37994">CVE-2025-37994 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38013/">CVE-2025-38013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38013">CVE-2025-38013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38075/">CVE-2025-38075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38075">CVE-2025-38075 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38116/">CVE-2025-38116 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38116">CVE-2025-38116 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38396/">CVE-2025-38396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38396">CVE-2025-38396 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38438/">CVE-2025-38438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38438">CVE-2025-38438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4628" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-45777" ref_url="https://www.suse.com/security/cve/CVE-2024-45777/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20532.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20532.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45777/">CVE-2024-45777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45777">CVE-2024-45777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054038" comment="grub2-common-2.06-114.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054039" comment="grub2-efi-x64-2.06-114.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054040" comment="grub2-efi-x64-cdboot-2.06-114.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054041" comment="grub2-efi-x64-modules-2.06-114.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054042" comment="grub2-pc-2.06-114.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054043" comment="grub2-pc-modules-2.06-114.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054044" comment="grub2-tools-2.06-114.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054045" comment="grub2-tools-efi-2.06-114.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054046" comment="grub2-tools-extra-2.06-114.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054047" comment="grub2-tools-minimal-2.06-114.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4629" version="1" class="patch">
	<metadata>
		<title>security update for shadow-utils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-56433" ref_url="https://www.suse.com/security/cve/CVE-2024-56433/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20559.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20559.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56433/">CVE-2024-56433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56433">CVE-2024-56433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054048" comment="shadow-utils-4.9-15.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054049" comment="shadow-utils-subid-4.9-15.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054050" comment="shadow-utils-subid-devel-4.9-15.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4630" version="1" class="patch">
	<metadata>
		<title>security update for zziplib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2018-17828" ref_url="https://www.suse.com/security/cve/CVE-2018-17828/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20838.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20838.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17828/">CVE-2018-17828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17828">CVE-2018-17828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025666" comment="zziplib-0.13.71-12.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025667" comment="zziplib-devel-0.13.71-12.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025668" comment="zziplib-utils-0.13.71-12.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4631" version="1" class="patch">
	<metadata>
		<title>security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907/" source="CVE"/>
		<reference ref_id="CVE-2025-9566" ref_url="https://www.suse.com/security/cve/CVE-2025-9566/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20909.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20909.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9566/">CVE-2025-9566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9566">CVE-2025-9566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054051" comment="podman-5.6.0-6.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054052" comment="podman-docker-5.6.0-6.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054053" comment="podman-plugins-5.6.0-6.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054054" comment="podman-remote-5.6.0-6.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054055" comment="podman-tests-5.6.0-6.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4632" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-43272" ref_url="https://www.suse.com/security/cve/CVE-2025-43272/" source="CVE"/>
		<reference ref_id="CVE-2025-43342" ref_url="https://www.suse.com/security/cve/CVE-2025-43342/" source="CVE"/>
		<reference ref_id="CVE-2025-43343" ref_url="https://www.suse.com/security/cve/CVE-2025-43343/" source="CVE"/>
		<reference ref_id="CVE-2025-43356" ref_url="https://www.suse.com/security/cve/CVE-2025-43356/" source="CVE"/>
		<reference ref_id="CVE-2025-43368" ref_url="https://www.suse.com/security/cve/CVE-2025-43368/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20922.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20922.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43272/">CVE-2025-43272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43272">CVE-2025-43272 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-43342/">CVE-2025-43342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43342">CVE-2025-43342 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43343/">CVE-2025-43343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43343">CVE-2025-43343 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43356/">CVE-2025-43356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43356">CVE-2025-43356 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-43368/">CVE-2025-43368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43368">CVE-2025-43368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054056" comment="webkit2gtk3-2.50.1-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054057" comment="webkit2gtk3-devel-2.50.1-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054058" comment="webkit2gtk3-jsc-2.50.1-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054059" comment="webkit2gtk3-jsc-devel-2.50.1-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4633" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-46817" ref_url="https://www.suse.com/security/cve/CVE-2025-46817/" source="CVE"/>
		<reference ref_id="CVE-2025-46818" ref_url="https://www.suse.com/security/cve/CVE-2025-46818/" source="CVE"/>
		<reference ref_id="CVE-2025-46819" ref_url="https://www.suse.com/security/cve/CVE-2025-46819/" source="CVE"/>
		<reference ref_id="CVE-2025-49844" ref_url="https://www.suse.com/security/cve/CVE-2025-49844/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20926.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20926.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46817/">CVE-2025-46817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817">CVE-2025-46817 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46818/">CVE-2025-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818">CVE-2025-46818 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46819/">CVE-2025-46819 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819">CVE-2025-46819 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-49844/">CVE-2025-49844 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844">CVE-2025-49844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054060" comment="redis-6.2.20-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054061" comment="redis-devel-6.2.20-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054062" comment="redis-doc-6.2.20-2.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4634" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-7493" ref_url="https://www.suse.com/security/cve/CVE-2025-7493/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20928.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20928.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-7493/">CVE-2025-7493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7493">CVE-2025-7493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054063" comment="ipa-client-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054064" comment="ipa-client-common-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054065" comment="ipa-client-encrypted-dns-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054066" comment="ipa-client-epn-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054067" comment="ipa-client-samba-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054068" comment="ipa-common-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054069" comment="ipa-selinux-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054070" comment="ipa-selinux-luna-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054071" comment="ipa-selinux-nfast-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054072" comment="ipa-server-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054073" comment="ipa-server-common-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054074" comment="ipa-server-dns-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054075" comment="ipa-server-encrypted-dns-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054076" comment="ipa-server-trust-ad-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054077" comment="python3-ipaclient-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054078" comment="python3-ipalib-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054079" comment="python3-ipaserver-4.12.2-22.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054080" comment="python3-ipatests-4.12.2-22.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4635" version="1" class="patch">
	<metadata>
		<title>security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-62168" ref_url="https://www.suse.com/security/cve/CVE-2025-62168/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20935.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20935.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62168/">CVE-2025-62168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62168">CVE-2025-62168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054081" comment="squid-5.5-22.el9_7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4636" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-6965" ref_url="https://www.suse.com/security/cve/CVE-2025-6965/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20936.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20936.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-6965/">CVE-2025-6965 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965">CVE-2025-6965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054082" comment="sqlite-3.34.1-9.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054083" comment="sqlite-devel-3.34.1-9.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054084" comment="sqlite-libs-3.34.1-9.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4637" version="1" class="patch">
	<metadata>
		<title>security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-5318" ref_url="https://www.suse.com/security/cve/CVE-2025-5318/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20943.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20943.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5318/">CVE-2025-5318 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5318">CVE-2025-5318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054085" comment="libssh-0.10.4-15.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054086" comment="libssh-config-0.10.4-15.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054087" comment="libssh-devel-0.10.4-15.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4638" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-53905" ref_url="https://www.suse.com/security/cve/CVE-2025-53905/" source="CVE"/>
		<reference ref_id="CVE-2025-53906" ref_url="https://www.suse.com/security/cve/CVE-2025-53906/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20945.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20945.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53905/">CVE-2025-53905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53905">CVE-2025-53905 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-53906/">CVE-2025-53906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53906">CVE-2025-53906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054088" comment="vim-X11-8.2.2637-23.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054089" comment="vim-common-8.2.2637-23.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054090" comment="vim-enhanced-8.2.2637-23.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054091" comment="vim-filesystem-8.2.2637-23.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054092" comment="vim-minimal-8.2.2637-23.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4639" version="1" class="patch">
	<metadata>
		<title>security update for sssd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-11561" ref_url="https://www.suse.com/security/cve/CVE-2025-11561/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20954.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20954.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11561/">CVE-2025-11561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11561">CVE-2025-11561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054093" comment="libipa_hbac-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054094" comment="libsss_autofs-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054095" comment="libsss_certmap-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054096" comment="libsss_idmap-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054097" comment="libsss_nss_idmap-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054098" comment="libsss_nss_idmap-devel-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054099" comment="libsss_simpleifp-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054100" comment="libsss_sudo-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054101" comment="python3-libipa_hbac-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054102" comment="python3-libsss_nss_idmap-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054103" comment="python3-sss-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054104" comment="python3-sss-murmur-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054105" comment="python3-sssdconfig-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054106" comment="sssd-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054107" comment="sssd-ad-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054108" comment="sssd-client-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054109" comment="sssd-common-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054110" comment="sssd-common-pac-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054111" comment="sssd-dbus-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054112" comment="sssd-idp-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054113" comment="sssd-ipa-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054114" comment="sssd-kcm-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054115" comment="sssd-krb5-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054116" comment="sssd-krb5-common-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054117" comment="sssd-ldap-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054118" comment="sssd-nfs-idmap-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054119" comment="sssd-passkey-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054120" comment="sssd-polkit-rules-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054121" comment="sssd-proxy-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054122" comment="sssd-tools-2.9.7-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054123" comment="sssd-winbind-idmap-2.9.7-4.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4640" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-46817" ref_url="https://www.suse.com/security/cve/CVE-2025-46817/" source="CVE"/>
		<reference ref_id="CVE-2025-46818" ref_url="https://www.suse.com/security/cve/CVE-2025-46818/" source="CVE"/>
		<reference ref_id="CVE-2025-46819" ref_url="https://www.suse.com/security/cve/CVE-2025-46819/" source="CVE"/>
		<reference ref_id="CVE-2025-49844" ref_url="https://www.suse.com/security/cve/CVE-2025-49844/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20955.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20955.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46817/">CVE-2025-46817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817">CVE-2025-46817 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46818/">CVE-2025-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818">CVE-2025-46818 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46819/">CVE-2025-46819 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819">CVE-2025-46819 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-49844/">CVE-2025-49844 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844">CVE-2025-49844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054124" comment="redis-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054125" comment="redis-devel-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054126" comment="redis-doc-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4641" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-8176" ref_url="https://www.suse.com/security/cve/CVE-2025-8176/" source="CVE"/>
		<reference ref_id="CVE-2025-9900" ref_url="https://www.suse.com/security/cve/CVE-2025-9900/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20956.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20956.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8176/">CVE-2025-8176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8176">CVE-2025-8176 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9900/">CVE-2025-9900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9900">CVE-2025-9900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054127" comment="libtiff-4.4.0-15.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054128" comment="libtiff-devel-4.4.0-15.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054129" comment="libtiff-tools-4.4.0-15.el9_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4642" version="1" class="patch">
	<metadata>
		<title>security update for runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133/" source="CVE"/>
		<reference ref_id="CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565/" source="CVE"/>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20957.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20957.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054130" comment="runc-1.3.0-4.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4643" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229/" source="CVE"/>
		<reference ref_id="CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230/" source="CVE"/>
		<reference ref_id="CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20958.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20958.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054131" comment="tigervnc-1.15.0-6.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054132" comment="tigervnc-icons-1.15.0-6.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054133" comment="tigervnc-license-1.15.0-6.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054134" comment="tigervnc-selinux-1.15.0-6.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054135" comment="tigervnc-server-1.15.0-6.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054136" comment="tigervnc-server-minimal-1.15.0-6.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054137" comment="tigervnc-server-module-1.15.0-6.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4644" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-11021" ref_url="https://www.suse.com/security/cve/CVE-2025-11021/" source="CVE"/>
		<reference ref_id="CVE-2025-4945" ref_url="https://www.suse.com/security/cve/CVE-2025-4945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20959.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20959.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11021/">CVE-2025-11021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11021">CVE-2025-11021 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4945/">CVE-2025-4945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4945">CVE-2025-4945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054138" comment="libsoup-2.72.0-12.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054139" comment="libsoup-devel-2.72.0-12.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4645" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server-Xwayland (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229/" source="CVE"/>
		<reference ref_id="CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230/" source="CVE"/>
		<reference ref_id="CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20960.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20960.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054140" comment="xorg-x11-server-Xwayland-23.2.7-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054141" comment="xorg-x11-server-Xwayland-devel-23.2.7-5.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4646" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229/" source="CVE"/>
		<reference ref_id="CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230/" source="CVE"/>
		<reference ref_id="CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20961.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20961.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054142" comment="xorg-x11-server-Xdmx-1.20.11-32.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054143" comment="xorg-x11-server-Xephyr-1.20.11-32.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054144" comment="xorg-x11-server-Xnest-1.20.11-32.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054145" comment="xorg-x11-server-Xorg-1.20.11-32.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054146" comment="xorg-x11-server-Xvfb-1.20.11-32.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054147" comment="xorg-x11-server-common-1.20.11-32.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054148" comment="xorg-x11-server-devel-1.20.11-32.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054149" comment="xorg-x11-server-source-1.20.11-32.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4647" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-59830" ref_url="https://www.suse.com/security/cve/CVE-2025-59830/" source="CVE"/>
		<reference ref_id="CVE-2025-61770" ref_url="https://www.suse.com/security/cve/CVE-2025-61770/" source="CVE"/>
		<reference ref_id="CVE-2025-61771" ref_url="https://www.suse.com/security/cve/CVE-2025-61771/" source="CVE"/>
		<reference ref_id="CVE-2025-61772" ref_url="https://www.suse.com/security/cve/CVE-2025-61772/" source="CVE"/>
		<reference ref_id="CVE-2025-61919" ref_url="https://www.suse.com/security/cve/CVE-2025-61919/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20962.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20962.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-59830/">CVE-2025-59830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59830">CVE-2025-59830 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61770/">CVE-2025-61770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61770">CVE-2025-61770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61771/">CVE-2025-61771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61771">CVE-2025-61771 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61772/">CVE-2025-61772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61772">CVE-2025-61772 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61919/">CVE-2025-61919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61919">CVE-2025-61919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054150" comment="pcs-0.11.10-1.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054151" comment="pcs-snmp-0.11.10-1.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4648" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qt3d (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-11277" ref_url="https://www.suse.com/security/cve/CVE-2025-11277/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20963.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20963.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11277/">CVE-2025-11277 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11277">CVE-2025-11277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054152" comment="qt5-qt3d-5.15.9-2.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054153" comment="qt5-qt3d-devel-5.15.9-2.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054154" comment="qt5-qt3d-examples-5.15.9-2.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4649" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-40778" ref_url="https://www.suse.com/security/cve/CVE-2025-40778/" source="CVE"/>
		<reference ref_id="CVE-2025-40780" ref_url="https://www.suse.com/security/cve/CVE-2025-40780/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21110.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21110.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40778/">CVE-2025-40778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778">CVE-2025-40778 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40780/">CVE-2025-40780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40780">CVE-2025-40780 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054155" comment="bind-9.16.23-34.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054156" comment="bind-chroot-9.16.23-34.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054157" comment="bind-devel-9.16.23-34.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054158" comment="bind-dnssec-doc-9.16.23-34.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054159" comment="bind-dnssec-utils-9.16.23-34.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054160" comment="bind-doc-9.16.23-34.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054161" comment="bind-libs-9.16.23-34.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054162" comment="bind-license-9.16.23-34.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054163" comment="bind-utils-9.16.23-34.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054164" comment="python3-bind-9.16.23-34.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4650" version="1" class="patch">
	<metadata>
		<title>security update for bind9.18 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-40778" ref_url="https://www.suse.com/security/cve/CVE-2025-40778/" source="CVE"/>
		<reference ref_id="CVE-2025-40780" ref_url="https://www.suse.com/security/cve/CVE-2025-40780/" source="CVE"/>
		<reference ref_id="CVE-2025-8677" ref_url="https://www.suse.com/security/cve/CVE-2025-8677/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21111.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21111.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40778/">CVE-2025-40778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778">CVE-2025-40778 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40780/">CVE-2025-40780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40780">CVE-2025-40780 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8677/">CVE-2025-8677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8677">CVE-2025-8677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054165" comment="bind9.18-9.18.29-5.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054166" comment="bind9.18-chroot-9.18.29-5.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054167" comment="bind9.18-devel-9.18.29-5.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054168" comment="bind9.18-dnssec-utils-9.18.29-5.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054169" comment="bind9.18-doc-9.18.29-5.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054170" comment="bind9.18-libs-9.18.29-5.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054171" comment="bind9.18-utils-9.18.29-5.el9_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4651" version="1" class="patch">
	<metadata>
		<title>security update for python-kdcproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-59088" ref_url="https://www.suse.com/security/cve/CVE-2025-59088/" source="CVE"/>
		<reference ref_id="CVE-2025-59089" ref_url="https://www.suse.com/security/cve/CVE-2025-59089/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21139.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21139.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59088/">CVE-2025-59088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59088">CVE-2025-59088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59089/">CVE-2025-59089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59089">CVE-2025-59089 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054172" comment="python3-kdcproxy-1.0.0-9.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4652" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21255.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21255.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054173" comment="openssl-3.5.1-4.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054174" comment="openssl-devel-3.5.1-4.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054175" comment="openssl-libs-3.5.1-4.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054176" comment="openssl-perl-3.5.1-4.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4653" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-13012" ref_url="https://www.suse.com/security/cve/CVE-2025-13012/" source="CVE"/>
		<reference ref_id="CVE-2025-13013" ref_url="https://www.suse.com/security/cve/CVE-2025-13013/" source="CVE"/>
		<reference ref_id="CVE-2025-13014" ref_url="https://www.suse.com/security/cve/CVE-2025-13014/" source="CVE"/>
		<reference ref_id="CVE-2025-13015" ref_url="https://www.suse.com/security/cve/CVE-2025-13015/" source="CVE"/>
		<reference ref_id="CVE-2025-13016" ref_url="https://www.suse.com/security/cve/CVE-2025-13016/" source="CVE"/>
		<reference ref_id="CVE-2025-13017" ref_url="https://www.suse.com/security/cve/CVE-2025-13017/" source="CVE"/>
		<reference ref_id="CVE-2025-13018" ref_url="https://www.suse.com/security/cve/CVE-2025-13018/" source="CVE"/>
		<reference ref_id="CVE-2025-13019" ref_url="https://www.suse.com/security/cve/CVE-2025-13019/" source="CVE"/>
		<reference ref_id="CVE-2025-13020" ref_url="https://www.suse.com/security/cve/CVE-2025-13020/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21280.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21280.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13012/">CVE-2025-13012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13012">CVE-2025-13012 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13013/">CVE-2025-13013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13013">CVE-2025-13013 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13014/">CVE-2025-13014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13014">CVE-2025-13014 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13015/">CVE-2025-13015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13015">CVE-2025-13015 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13016/">CVE-2025-13016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13016">CVE-2025-13016 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13017/">CVE-2025-13017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13017">CVE-2025-13017 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13018/">CVE-2025-13018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13018">CVE-2025-13018 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13019/">CVE-2025-13019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13019">CVE-2025-13019 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13020/">CVE-2025-13020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13020">CVE-2025-13020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054177" comment="firefox-140.5.0-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054178" comment="firefox-x11-140.5.0-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4654" version="1" class="patch">
	<metadata>
		<title>security update for lasso (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-47151" ref_url="https://www.suse.com/security/cve/CVE-2025-47151/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21462.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21462.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47151/">CVE-2025-47151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47151">CVE-2025-47151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054179" comment="lasso-2.7.0-11.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054180" comment="lasso-devel-2.7.0-11.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054181" comment="python3-lasso-2.7.0-11.el9_7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4655" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-38351" ref_url="https://www.suse.com/security/cve/CVE-2025-38351/" source="CVE"/>
		<reference ref_id="CVE-2025-38498" ref_url="https://www.suse.com/security/cve/CVE-2025-38498/" source="CVE"/>
		<reference ref_id="CVE-2025-39697" ref_url="https://www.suse.com/security/cve/CVE-2025-39697/" source="CVE"/>
		<reference ref_id="CVE-2025-39881" ref_url="https://www.suse.com/security/cve/CVE-2025-39881/" source="CVE"/>
		<reference ref_id="CVE-2025-39971" ref_url="https://www.suse.com/security/cve/CVE-2025-39971/" source="CVE"/>
		<reference ref_id="CVE-2025-39973" ref_url="https://www.suse.com/security/cve/CVE-2025-39973/" source="CVE"/>
		<reference ref_id="CVE-2025-39982" ref_url="https://www.suse.com/security/cve/CVE-2025-39982/" source="CVE"/>
		<reference ref_id="CVE-2025-39983" ref_url="https://www.suse.com/security/cve/CVE-2025-39983/" source="CVE"/>
		<reference ref_id="CVE-2025-40047" ref_url="https://www.suse.com/security/cve/CVE-2025-40047/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21469.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21469.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38351/">CVE-2025-38351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38351">CVE-2025-38351 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38498/">CVE-2025-38498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38498">CVE-2025-38498 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39697/">CVE-2025-39697 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39697">CVE-2025-39697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39881/">CVE-2025-39881 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39881">CVE-2025-39881 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39971/">CVE-2025-39971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39971">CVE-2025-39971 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39973/">CVE-2025-39973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39973">CVE-2025-39973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39982/">CVE-2025-39982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39982">CVE-2025-39982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39983/">CVE-2025-39983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39983">CVE-2025-39983 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40047/">CVE-2025-40047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40047">CVE-2025-40047 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054182" comment="kernel-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054183" comment="kernel-abi-stablelists-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054184" comment="kernel-core-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054185" comment="kernel-cross-headers-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054186" comment="kernel-debug-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054187" comment="kernel-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054188" comment="kernel-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054189" comment="kernel-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054190" comment="kernel-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054191" comment="kernel-debug-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054192" comment="kernel-doc-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054193" comment="kernel-headers-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054194" comment="kernel-modules-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054195" comment="kernel-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054196" comment="kernel-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054197" comment="kernel-rt-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054198" comment="kernel-rt-core-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054199" comment="kernel-rt-debug-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054200" comment="kernel-rt-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054201" comment="kernel-rt-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054202" comment="kernel-rt-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054203" comment="kernel-rt-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054204" comment="kernel-rt-modules-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054205" comment="kernel-rt-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054206" comment="kernel-rt-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054207" comment="kernel-tools-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054208" comment="kernel-tools-libs-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054209" comment="kernel-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054210" comment="kernel-uki-virt-addons-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054211" comment="libperf-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054212" comment="perf-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054213" comment="python3-perf-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054214" comment="rtla-5.14.0-611.8.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054215" comment="rv-5.14.0-611.8.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4656" version="1" class="patch">
	<metadata>
		<title>security update for haproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-11230" ref_url="https://www.suse.com/security/cve/CVE-2025-11230/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21693.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21693.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11230/">CVE-2025-11230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11230">CVE-2025-11230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054216" comment="haproxy-2.8.14-1.el9_7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4657" version="1" class="patch">
	<metadata>
		<title>security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21702.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21702.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054217" comment="podman-5.6.0-7.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054218" comment="podman-docker-5.6.0-7.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054219" comment="podman-plugins-5.6.0-7.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054220" comment="podman-remote-5.6.0-7.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054221" comment="podman-tests-5.6.0-7.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4658" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21815.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21815.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054222" comment="delve-1.25.2-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054223" comment="go-toolset-1.25.3-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054224" comment="golang-1.25.3-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054225" comment="golang-bin-1.25.3-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054226" comment="golang-docs-1.25.3-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054227" comment="golang-misc-1.25.3-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054228" comment="golang-race-1.25.3-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054229" comment="golang-src-1.25.3-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054230" comment="golang-tests-1.25.3-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4659" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-13012" ref_url="https://www.suse.com/security/cve/CVE-2025-13012/" source="CVE"/>
		<reference ref_id="CVE-2025-13013" ref_url="https://www.suse.com/security/cve/CVE-2025-13013/" source="CVE"/>
		<reference ref_id="CVE-2025-13014" ref_url="https://www.suse.com/security/cve/CVE-2025-13014/" source="CVE"/>
		<reference ref_id="CVE-2025-13015" ref_url="https://www.suse.com/security/cve/CVE-2025-13015/" source="CVE"/>
		<reference ref_id="CVE-2025-13016" ref_url="https://www.suse.com/security/cve/CVE-2025-13016/" source="CVE"/>
		<reference ref_id="CVE-2025-13017" ref_url="https://www.suse.com/security/cve/CVE-2025-13017/" source="CVE"/>
		<reference ref_id="CVE-2025-13018" ref_url="https://www.suse.com/security/cve/CVE-2025-13018/" source="CVE"/>
		<reference ref_id="CVE-2025-13019" ref_url="https://www.suse.com/security/cve/CVE-2025-13019/" source="CVE"/>
		<reference ref_id="CVE-2025-13020" ref_url="https://www.suse.com/security/cve/CVE-2025-13020/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21842.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21842.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13012/">CVE-2025-13012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13012">CVE-2025-13012 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13013/">CVE-2025-13013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13013">CVE-2025-13013 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13014/">CVE-2025-13014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13014">CVE-2025-13014 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13015/">CVE-2025-13015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13015">CVE-2025-13015 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13016/">CVE-2025-13016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13016">CVE-2025-13016 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13017/">CVE-2025-13017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13017">CVE-2025-13017 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13018/">CVE-2025-13018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13018">CVE-2025-13018 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13019/">CVE-2025-13019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13019">CVE-2025-13019 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13020/">CVE-2025-13020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13020">CVE-2025-13020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054231" comment="thunderbird-140.5.0-1.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4660" version="1" class="patch">
	<metadata>
		<title>security update for valkey (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-46817" ref_url="https://www.suse.com/security/cve/CVE-2025-46817/" source="CVE"/>
		<reference ref_id="CVE-2025-46818" ref_url="https://www.suse.com/security/cve/CVE-2025-46818/" source="CVE"/>
		<reference ref_id="CVE-2025-46819" ref_url="https://www.suse.com/security/cve/CVE-2025-46819/" source="CVE"/>
		<reference ref_id="CVE-2025-49844" ref_url="https://www.suse.com/security/cve/CVE-2025-49844/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21916.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21916.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46817/">CVE-2025-46817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817">CVE-2025-46817 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46818/">CVE-2025-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818">CVE-2025-46818 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46819/">CVE-2025-46819 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819">CVE-2025-46819 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-49844/">CVE-2025-49844 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844">CVE-2025-49844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054232" comment="valkey-8.0.6-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054233" comment="valkey-devel-8.0.6-2.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4661" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-39843" ref_url="https://www.suse.com/security/cve/CVE-2025-39843/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21926.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21926.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39843/">CVE-2025-39843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39843">CVE-2025-39843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054234" comment="kernel-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054235" comment="kernel-abi-stablelists-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054236" comment="kernel-core-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054237" comment="kernel-cross-headers-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054238" comment="kernel-debug-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054239" comment="kernel-debug-core-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054240" comment="kernel-debug-modules-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054241" comment="kernel-debug-modules-core-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054242" comment="kernel-debug-modules-extra-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054243" comment="kernel-debug-uki-virt-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054244" comment="kernel-doc-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054245" comment="kernel-headers-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054246" comment="kernel-modules-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054247" comment="kernel-modules-core-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054248" comment="kernel-modules-extra-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054249" comment="kernel-rt-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054250" comment="kernel-rt-core-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054251" comment="kernel-rt-debug-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054252" comment="kernel-rt-debug-core-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054253" comment="kernel-rt-debug-modules-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054254" comment="kernel-rt-debug-modules-core-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054255" comment="kernel-rt-debug-modules-extra-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054256" comment="kernel-rt-modules-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054257" comment="kernel-rt-modules-core-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054258" comment="kernel-rt-modules-extra-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054259" comment="kernel-tools-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054260" comment="kernel-tools-libs-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054261" comment="kernel-uki-virt-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054262" comment="kernel-uki-virt-addons-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054263" comment="libperf-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054264" comment="perf-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054265" comment="python3-perf-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054266" comment="rtla-5.14.0-611.9.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054267" comment="rv-5.14.0-611.9.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4662" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-10920" ref_url="https://www.suse.com/security/cve/CVE-2025-10920/" source="CVE"/>
		<reference ref_id="CVE-2025-10921" ref_url="https://www.suse.com/security/cve/CVE-2025-10921/" source="CVE"/>
		<reference ref_id="CVE-2025-10922" ref_url="https://www.suse.com/security/cve/CVE-2025-10922/" source="CVE"/>
		<reference ref_id="CVE-2025-10923" ref_url="https://www.suse.com/security/cve/CVE-2025-10923/" source="CVE"/>
		<reference ref_id="CVE-2025-10924" ref_url="https://www.suse.com/security/cve/CVE-2025-10924/" source="CVE"/>
		<reference ref_id="CVE-2025-10925" ref_url="https://www.suse.com/security/cve/CVE-2025-10925/" source="CVE"/>
		<reference ref_id="CVE-2025-10934" ref_url="https://www.suse.com/security/cve/CVE-2025-10934/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21968.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21968.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10920/">CVE-2025-10920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10920">CVE-2025-10920 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10921/">CVE-2025-10921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10921">CVE-2025-10921 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10922/">CVE-2025-10922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10922">CVE-2025-10922 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-10923/">CVE-2025-10923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10923">CVE-2025-10923 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10924/">CVE-2025-10924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10924">CVE-2025-10924 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10925/">CVE-2025-10925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10925">CVE-2025-10925 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10934/">CVE-2025-10934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10934">CVE-2025-10934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054268" comment="gimp-3.0.4-1.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054269" comment="gimp-libs-3.0.4-1.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4663" version="1" class="patch">
	<metadata>
		<title>security update for go-rpm-macros (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-47906" ref_url="https://www.suse.com/security/cve/CVE-2025-47906/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22005.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22005.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47906/">CVE-2025-47906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47906">CVE-2025-47906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054270" comment="go-filesystem-3.6.0-12.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054271" comment="go-rpm-macros-3.6.0-12.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054272" comment="go-rpm-templates-3.6.0-12.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054273" comment="go-srpm-macros-3.6.0-12.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4664" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22011.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22011.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054274" comment="buildah-1.41.6-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054275" comment="buildah-tests-1.41.6-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4665" version="1" class="patch">
	<metadata>
		<title>security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22175.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22175.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054276" comment="expat-2.5.0-5.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054277" comment="expat-devel-2.5.0-5.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4666" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-9714" ref_url="https://www.suse.com/security/cve/CVE-2025-9714/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22376.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22376.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9714/">CVE-2025-9714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9714">CVE-2025-9714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054278" comment="libxml2-2.9.13-14.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054279" comment="libxml2-devel-2.9.13-14.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054280" comment="python3-libxml2-2.9.13-14.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4667" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-38724" ref_url="https://www.suse.com/security/cve/CVE-2025-38724/" source="CVE"/>
		<reference ref_id="CVE-2025-39864" ref_url="https://www.suse.com/security/cve/CVE-2025-39864/" source="CVE"/>
		<reference ref_id="CVE-2025-39898" ref_url="https://www.suse.com/security/cve/CVE-2025-39898/" source="CVE"/>
		<reference ref_id="CVE-2025-39918" ref_url="https://www.suse.com/security/cve/CVE-2025-39918/" source="CVE"/>
		<reference ref_id="CVE-2025-39955" ref_url="https://www.suse.com/security/cve/CVE-2025-39955/" source="CVE"/>
		<reference ref_id="CVE-2025-39981" ref_url="https://www.suse.com/security/cve/CVE-2025-39981/" source="CVE"/>
		<reference ref_id="CVE-2025-40058" ref_url="https://www.suse.com/security/cve/CVE-2025-40058/" source="CVE"/>
		<reference ref_id="CVE-2025-40185" ref_url="https://www.suse.com/security/cve/CVE-2025-40185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22405.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22405.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38724/">CVE-2025-38724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38724">CVE-2025-38724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39864/">CVE-2025-39864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39864">CVE-2025-39864 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39898/">CVE-2025-39898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39898">CVE-2025-39898 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39918/">CVE-2025-39918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39918">CVE-2025-39918 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39955/">CVE-2025-39955 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955">CVE-2025-39955 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39981/">CVE-2025-39981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39981">CVE-2025-39981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40058/">CVE-2025-40058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40058">CVE-2025-40058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40185/">CVE-2025-40185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40185">CVE-2025-40185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054281" comment="kernel-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054282" comment="kernel-abi-stablelists-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054283" comment="kernel-core-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054284" comment="kernel-cross-headers-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054285" comment="kernel-debug-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054286" comment="kernel-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054287" comment="kernel-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054288" comment="kernel-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054289" comment="kernel-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054290" comment="kernel-debug-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054291" comment="kernel-doc-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054292" comment="kernel-headers-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054293" comment="kernel-modules-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054294" comment="kernel-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054295" comment="kernel-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054296" comment="kernel-rt-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054297" comment="kernel-rt-core-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054298" comment="kernel-rt-debug-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054299" comment="kernel-rt-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054300" comment="kernel-rt-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054301" comment="kernel-rt-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054302" comment="kernel-rt-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054303" comment="kernel-rt-modules-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054304" comment="kernel-rt-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054305" comment="kernel-rt-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054306" comment="kernel-tools-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054307" comment="kernel-tools-libs-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054308" comment="kernel-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054309" comment="kernel-uki-virt-addons-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054310" comment="libperf-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054311" comment="perf-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054312" comment="python3-perf-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054313" comment="rtla-5.14.0-611.11.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054314" comment="rv-5.14.0-611.11.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4668" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-4598" ref_url="https://www.suse.com/security/cve/CVE-2025-4598/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22660.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22660.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-4598/">CVE-2025-4598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4598">CVE-2025-4598 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054315" comment="rhel-net-naming-sysattrs-252-55.el9_7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054316" comment="systemd-252-55.el9_7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054317" comment="systemd-boot-unsigned-252-55.el9_7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054318" comment="systemd-container-252-55.el9_7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054319" comment="systemd-devel-252-55.el9_7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054320" comment="systemd-journal-remote-252-55.el9_7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054321" comment="systemd-libs-252-55.el9_7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054322" comment="systemd-oomd-252-55.el9_7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054323" comment="systemd-pam-252-55.el9_7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054324" comment="systemd-resolved-252-55.el9_7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054325" comment="systemd-rpm-macros-252-55.el9_7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054326" comment="systemd-udev-252-55.el9_7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054327" comment="systemd-ukify-252-55.el9_7.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4669" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-13502" ref_url="https://www.suse.com/security/cve/CVE-2025-13502/" source="CVE"/>
		<reference ref_id="CVE-2025-13947" ref_url="https://www.suse.com/security/cve/CVE-2025-13947/" source="CVE"/>
		<reference ref_id="CVE-2025-43392" ref_url="https://www.suse.com/security/cve/CVE-2025-43392/" source="CVE"/>
		<reference ref_id="CVE-2025-43421" ref_url="https://www.suse.com/security/cve/CVE-2025-43421/" source="CVE"/>
		<reference ref_id="CVE-2025-43425" ref_url="https://www.suse.com/security/cve/CVE-2025-43425/" source="CVE"/>
		<reference ref_id="CVE-2025-43427" ref_url="https://www.suse.com/security/cve/CVE-2025-43427/" source="CVE"/>
		<reference ref_id="CVE-2025-43429" ref_url="https://www.suse.com/security/cve/CVE-2025-43429/" source="CVE"/>
		<reference ref_id="CVE-2025-43430" ref_url="https://www.suse.com/security/cve/CVE-2025-43430/" source="CVE"/>
		<reference ref_id="CVE-2025-43431" ref_url="https://www.suse.com/security/cve/CVE-2025-43431/" source="CVE"/>
		<reference ref_id="CVE-2025-43432" ref_url="https://www.suse.com/security/cve/CVE-2025-43432/" source="CVE"/>
		<reference ref_id="CVE-2025-43433" ref_url="https://www.suse.com/security/cve/CVE-2025-43433/" source="CVE"/>
		<reference ref_id="CVE-2025-43434" ref_url="https://www.suse.com/security/cve/CVE-2025-43434/" source="CVE"/>
		<reference ref_id="CVE-2025-43438" ref_url="https://www.suse.com/security/cve/CVE-2025-43438/" source="CVE"/>
		<reference ref_id="CVE-2025-43440" ref_url="https://www.suse.com/security/cve/CVE-2025-43440/" source="CVE"/>
		<reference ref_id="CVE-2025-43441" ref_url="https://www.suse.com/security/cve/CVE-2025-43441/" source="CVE"/>
		<reference ref_id="CVE-2025-43443" ref_url="https://www.suse.com/security/cve/CVE-2025-43443/" source="CVE"/>
		<reference ref_id="CVE-2025-43458" ref_url="https://www.suse.com/security/cve/CVE-2025-43458/" source="CVE"/>
		<reference ref_id="CVE-2025-66287" ref_url="https://www.suse.com/security/cve/CVE-2025-66287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22790.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22790.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13502/">CVE-2025-13502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13502">CVE-2025-13502 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13947/">CVE-2025-13947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13947">CVE-2025-13947 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43392/">CVE-2025-43392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43392">CVE-2025-43392 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43421/">CVE-2025-43421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43421">CVE-2025-43421 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43425/">CVE-2025-43425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43425">CVE-2025-43425 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43427/">CVE-2025-43427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43427">CVE-2025-43427 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43429/">CVE-2025-43429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43429">CVE-2025-43429 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43430/">CVE-2025-43430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43430">CVE-2025-43430 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-43431/">CVE-2025-43431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43431">CVE-2025-43431 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43432/">CVE-2025-43432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43432">CVE-2025-43432 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43433/">CVE-2025-43433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43433">CVE-2025-43433 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43434/">CVE-2025-43434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43434">CVE-2025-43434 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43438/">CVE-2025-43438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43438">CVE-2025-43438 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43440/">CVE-2025-43440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43440">CVE-2025-43440 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43441/">CVE-2025-43441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43441">CVE-2025-43441 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43443/">CVE-2025-43443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43443">CVE-2025-43443 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43458/">CVE-2025-43458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43458">CVE-2025-43458 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66287/">CVE-2025-66287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66287">CVE-2025-66287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4670" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-39925" ref_url="https://www.suse.com/security/cve/CVE-2025-39925/" source="CVE"/>
		<reference ref_id="CVE-2025-39979" ref_url="https://www.suse.com/security/cve/CVE-2025-39979/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22865.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22865.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39925/">CVE-2025-39925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39925">CVE-2025-39925 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39979/">CVE-2025-39979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39979">CVE-2025-39979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054332" comment="kernel-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054333" comment="kernel-abi-stablelists-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054334" comment="kernel-core-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054335" comment="kernel-cross-headers-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054336" comment="kernel-debug-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054337" comment="kernel-debug-core-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054338" comment="kernel-debug-modules-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054339" comment="kernel-debug-modules-core-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054340" comment="kernel-debug-modules-extra-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054341" comment="kernel-debug-uki-virt-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054342" comment="kernel-doc-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054343" comment="kernel-headers-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054344" comment="kernel-modules-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054345" comment="kernel-modules-core-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054346" comment="kernel-modules-extra-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054347" comment="kernel-rt-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054348" comment="kernel-rt-core-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054349" comment="kernel-rt-debug-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054350" comment="kernel-rt-debug-core-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054351" comment="kernel-rt-debug-modules-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054352" comment="kernel-rt-debug-modules-core-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054353" comment="kernel-rt-debug-modules-extra-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054354" comment="kernel-rt-modules-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054355" comment="kernel-rt-modules-core-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054356" comment="kernel-rt-modules-extra-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054357" comment="kernel-tools-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054358" comment="kernel-tools-libs-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054359" comment="kernel-uki-virt-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054360" comment="kernel-uki-virt-addons-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054361" comment="libperf-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054362" comment="perf-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054363" comment="python3-perf-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054364" comment="rtla-5.14.0-611.13.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054365" comment="rv-5.14.0-611.13.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4671" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-14321" ref_url="https://www.suse.com/security/cve/CVE-2025-14321/" source="CVE"/>
		<reference ref_id="CVE-2025-14322" ref_url="https://www.suse.com/security/cve/CVE-2025-14322/" source="CVE"/>
		<reference ref_id="CVE-2025-14323" ref_url="https://www.suse.com/security/cve/CVE-2025-14323/" source="CVE"/>
		<reference ref_id="CVE-2025-14324" ref_url="https://www.suse.com/security/cve/CVE-2025-14324/" source="CVE"/>
		<reference ref_id="CVE-2025-14325" ref_url="https://www.suse.com/security/cve/CVE-2025-14325/" source="CVE"/>
		<reference ref_id="CVE-2025-14328" ref_url="https://www.suse.com/security/cve/CVE-2025-14328/" source="CVE"/>
		<reference ref_id="CVE-2025-14329" ref_url="https://www.suse.com/security/cve/CVE-2025-14329/" source="CVE"/>
		<reference ref_id="CVE-2025-14330" ref_url="https://www.suse.com/security/cve/CVE-2025-14330/" source="CVE"/>
		<reference ref_id="CVE-2025-14331" ref_url="https://www.suse.com/security/cve/CVE-2025-14331/" source="CVE"/>
		<reference ref_id="CVE-2025-14333" ref_url="https://www.suse.com/security/cve/CVE-2025-14333/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23034.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23034.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14321/">CVE-2025-14321 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14321">CVE-2025-14321 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14322/">CVE-2025-14322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14322">CVE-2025-14322 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14323/">CVE-2025-14323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14323">CVE-2025-14323 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14324/">CVE-2025-14324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14324">CVE-2025-14324 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14325/">CVE-2025-14325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14325">CVE-2025-14325 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14328/">CVE-2025-14328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14328">CVE-2025-14328 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14329/">CVE-2025-14329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14329">CVE-2025-14329 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14330/">CVE-2025-14330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14330">CVE-2025-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14331/">CVE-2025-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14331">CVE-2025-14331 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14333/">CVE-2025-14333 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14333">CVE-2025-14333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054366" comment="firefox-140.6.0-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054367" comment="firefox-x11-140.6.0-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4672" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-31651" ref_url="https://www.suse.com/security/cve/CVE-2025-31651/" source="CVE"/>
		<reference ref_id="CVE-2025-55752" ref_url="https://www.suse.com/security/cve/CVE-2025-55752/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23049.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23049.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31651/">CVE-2025-31651 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31651">CVE-2025-31651 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55752/">CVE-2025-55752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55752">CVE-2025-55752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054368" comment="tomcat-9.0.87-6.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054369" comment="tomcat-admin-webapps-9.0.87-6.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054370" comment="tomcat-docs-webapp-9.0.87-6.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054371" comment="tomcat-el-3.0-api-9.0.87-6.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054372" comment="tomcat-jsp-2.3-api-9.0.87-6.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054373" comment="tomcat-lib-9.0.87-6.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054374" comment="tomcat-servlet-4.0-api-9.0.87-6.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054375" comment="tomcat-webapps-9.0.87-6.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4673" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-24294" ref_url="https://www.suse.com/security/cve/CVE-2025-24294/" source="CVE"/>
		<reference ref_id="CVE-2025-58767" ref_url="https://www.suse.com/security/cve/CVE-2025-58767/" source="CVE"/>
		<reference ref_id="CVE-2025-61594" ref_url="https://www.suse.com/security/cve/CVE-2025-61594/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23063.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23063.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24294/">CVE-2025-24294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24294">CVE-2025-24294 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58767/">CVE-2025-58767 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58767">CVE-2025-58767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61594/">CVE-2025-61594 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61594">CVE-2025-61594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054376" comment="ruby-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054377" comment="ruby-bundled-gems-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054378" comment="ruby-default-gems-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054379" comment="ruby-devel-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054380" comment="ruby-doc-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054381" comment="ruby-libs-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054382" comment="rubygem-bigdecimal-3.1.5-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054383" comment="rubygem-bundler-2.5.22-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054384" comment="rubygem-io-console-0.7.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054385" comment="rubygem-irb-1.13.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054386" comment="rubygem-json-2.7.2-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054387" comment="rubygem-minitest-5.20.0-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054388" comment="rubygem-mysql2-0.5.5-3.module+el9.7.0+23362+7018fe7e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054389" comment="rubygem-mysql2-doc-0.5.5-3.module+el9.7.0+23362+7018fe7e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054390" comment="rubygem-power_assert-2.0.3-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054391" comment="rubygem-psych-5.1.2-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054392" comment="rubygem-racc-1.7.3-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054393" comment="rubygem-rake-13.1.0-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054394" comment="rubygem-rbs-3.4.0-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054395" comment="rubygem-rdoc-6.6.3.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054396" comment="rubygem-rexml-3.4.4-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054397" comment="rubygem-rss-0.3.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054398" comment="rubygem-test-unit-3.6.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054399" comment="rubygem-typeprof-0.21.9-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054400" comment="rubygems-3.5.22-5.module+el9.7.0+23651+15dc1615 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054401" comment="rubygems-devel-3.5.22-5.module+el9.7.0+23651+15dc1615 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4674" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23087.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23087.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054402" comment="grafana-10.2.6-17.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054403" comment="grafana-selinux-10.2.6-17.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4675" version="1" class="patch">
	<metadata>
		<title>security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-53040" ref_url="https://www.suse.com/security/cve/CVE-2025-53040/" source="CVE"/>
		<reference ref_id="CVE-2025-53042" ref_url="https://www.suse.com/security/cve/CVE-2025-53042/" source="CVE"/>
		<reference ref_id="CVE-2025-53044" ref_url="https://www.suse.com/security/cve/CVE-2025-53044/" source="CVE"/>
		<reference ref_id="CVE-2025-53045" ref_url="https://www.suse.com/security/cve/CVE-2025-53045/" source="CVE"/>
		<reference ref_id="CVE-2025-53053" ref_url="https://www.suse.com/security/cve/CVE-2025-53053/" source="CVE"/>
		<reference ref_id="CVE-2025-53054" ref_url="https://www.suse.com/security/cve/CVE-2025-53054/" source="CVE"/>
		<reference ref_id="CVE-2025-53062" ref_url="https://www.suse.com/security/cve/CVE-2025-53062/" source="CVE"/>
		<reference ref_id="CVE-2025-53069" ref_url="https://www.suse.com/security/cve/CVE-2025-53069/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23109.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23109.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53040/">CVE-2025-53040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53040">CVE-2025-53040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53042/">CVE-2025-53042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53042">CVE-2025-53042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53044/">CVE-2025-53044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53044">CVE-2025-53044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53045/">CVE-2025-53045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53045">CVE-2025-53045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53053/">CVE-2025-53053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53053">CVE-2025-53053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53054/">CVE-2025-53054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53054">CVE-2025-53054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53062/">CVE-2025-53062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53062">CVE-2025-53062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53069/">CVE-2025-53069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53069">CVE-2025-53069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054404" comment="mysql-8.0.44-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054405" comment="mysql-common-8.0.44-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054406" comment="mysql-devel-8.0.44-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054407" comment="mysql-errmsg-8.0.44-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054408" comment="mysql-libs-8.0.44-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054409" comment="mysql-server-8.0.44-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054410" comment="mysql-test-8.0.44-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4676" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-53040" ref_url="https://www.suse.com/security/cve/CVE-2025-53040/" source="CVE"/>
		<reference ref_id="CVE-2025-53042" ref_url="https://www.suse.com/security/cve/CVE-2025-53042/" source="CVE"/>
		<reference ref_id="CVE-2025-53044" ref_url="https://www.suse.com/security/cve/CVE-2025-53044/" source="CVE"/>
		<reference ref_id="CVE-2025-53045" ref_url="https://www.suse.com/security/cve/CVE-2025-53045/" source="CVE"/>
		<reference ref_id="CVE-2025-53053" ref_url="https://www.suse.com/security/cve/CVE-2025-53053/" source="CVE"/>
		<reference ref_id="CVE-2025-53054" ref_url="https://www.suse.com/security/cve/CVE-2025-53054/" source="CVE"/>
		<reference ref_id="CVE-2025-53062" ref_url="https://www.suse.com/security/cve/CVE-2025-53062/" source="CVE"/>
		<reference ref_id="CVE-2025-53069" ref_url="https://www.suse.com/security/cve/CVE-2025-53069/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23111.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23111.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53040/">CVE-2025-53040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53040">CVE-2025-53040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53042/">CVE-2025-53042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53042">CVE-2025-53042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53044/">CVE-2025-53044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53044">CVE-2025-53044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53045/">CVE-2025-53045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53045">CVE-2025-53045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53053/">CVE-2025-53053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53053">CVE-2025-53053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53054/">CVE-2025-53054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53054">CVE-2025-53054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53062/">CVE-2025-53062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53062">CVE-2025-53062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53069/">CVE-2025-53069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53069">CVE-2025-53069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054411" comment="mysql-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054412" comment="mysql-common-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054413" comment="mysql-devel-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054414" comment="mysql-errmsg-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054415" comment="mysql-libs-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054416" comment="mysql-server-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054417" comment="mysql-test-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054418" comment="mysql-test-data-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4677" version="1" class="patch">
	<metadata>
		<title>security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-13499" ref_url="https://www.suse.com/security/cve/CVE-2025-13499/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23142.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23142.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13499/">CVE-2025-13499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13499">CVE-2025-13499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054419" comment="wireshark-3.4.10-8.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054420" comment="wireshark-cli-3.4.10-8.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054421" comment="wireshark-devel-3.4.10-8.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4678" version="1" class="patch">
	<metadata>
		<title>security update for keylime (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-13609" ref_url="https://www.suse.com/security/cve/CVE-2025-13609/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23210.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23210.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-13609/">CVE-2025-13609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13609">CVE-2025-13609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054422" comment="keylime-7.12.1-11.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054423" comment="keylime-base-7.12.1-11.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054424" comment="keylime-registrar-7.12.1-11.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054425" comment="keylime-selinux-7.12.1-11.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054426" comment="keylime-tenant-7.12.1-11.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054427" comment="keylime-verifier-7.12.1-11.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054428" comment="python3-keylime-7.12.1-11.el9_7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4679" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-38499" ref_url="https://www.suse.com/security/cve/CVE-2025-38499/" source="CVE"/>
		<reference ref_id="CVE-2025-39966" ref_url="https://www.suse.com/security/cve/CVE-2025-39966/" source="CVE"/>
		<reference ref_id="CVE-2025-40176" ref_url="https://www.suse.com/security/cve/CVE-2025-40176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23241.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23241.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H" cvss4="6.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38499/">CVE-2025-38499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38499">CVE-2025-38499 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39966/">CVE-2025-39966 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39966">CVE-2025-39966 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40176/">CVE-2025-40176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40176">CVE-2025-40176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054429" comment="kernel-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054430" comment="kernel-abi-stablelists-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054431" comment="kernel-core-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054432" comment="kernel-cross-headers-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054433" comment="kernel-debug-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054434" comment="kernel-debug-core-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054435" comment="kernel-debug-modules-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054436" comment="kernel-debug-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054437" comment="kernel-debug-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054438" comment="kernel-debug-uki-virt-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054439" comment="kernel-doc-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054440" comment="kernel-headers-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054441" comment="kernel-modules-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054442" comment="kernel-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054443" comment="kernel-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054444" comment="kernel-rt-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054445" comment="kernel-rt-core-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054446" comment="kernel-rt-debug-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054447" comment="kernel-rt-debug-core-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054448" comment="kernel-rt-debug-modules-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054449" comment="kernel-rt-debug-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054450" comment="kernel-rt-debug-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054451" comment="kernel-rt-modules-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054452" comment="kernel-rt-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054453" comment="kernel-rt-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054454" comment="kernel-tools-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054455" comment="kernel-tools-libs-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054456" comment="kernel-uki-virt-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054457" comment="kernel-uki-virt-addons-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054458" comment="libperf-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054459" comment="perf-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054460" comment="python3-perf-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054461" comment="rtla-5.14.0-611.16.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054462" comment="rv-5.14.0-611.16.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4680" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-1220" ref_url="https://www.suse.com/security/cve/CVE-2025-1220/" source="CVE"/>
		<reference ref_id="CVE-2025-1735" ref_url="https://www.suse.com/security/cve/CVE-2025-1735/" source="CVE"/>
		<reference ref_id="CVE-2025-6491" ref_url="https://www.suse.com/security/cve/CVE-2025-6491/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23309.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23309.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1220/">CVE-2025-1220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1220">CVE-2025-1220 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1735/">CVE-2025-1735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1735">CVE-2025-1735 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6491/">CVE-2025-6491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6491">CVE-2025-6491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054463" comment="php-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054464" comment="php-bcmath-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054465" comment="php-cli-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054466" comment="php-common-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054467" comment="php-dba-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054468" comment="php-dbg-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054469" comment="php-devel-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054470" comment="php-embedded-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054471" comment="php-enchant-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054472" comment="php-ffi-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054473" comment="php-fpm-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054474" comment="php-gd-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054475" comment="php-gmp-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054476" comment="php-intl-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054477" comment="php-ldap-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054478" comment="php-mbstring-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054479" comment="php-mysqlnd-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054480" comment="php-odbc-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054481" comment="php-opcache-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054482" comment="php-pdo-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054483" comment="php-pgsql-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054484" comment="php-process-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054485" comment="php-snmp-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054486" comment="php-soap-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054487" comment="php-xml-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4681" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23323.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23323.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054488" comment="python3.12-3.12.12-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054489" comment="python3.12-debug-3.12.12-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054490" comment="python3.12-devel-3.12.12-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054491" comment="python3.12-idle-3.12.12-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054492" comment="python3.12-libs-3.12.12-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054493" comment="python3.12-test-3.12.12-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054494" comment="python3.12-tkinter-3.12.12-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4682" version="1" class="patch">
	<metadata>
		<title>security update for podman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23325.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23325.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054495" comment="podman-5.6.0-9.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054496" comment="podman-docker-5.6.0-9.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054497" comment="podman-plugins-5.6.0-9.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054498" comment="podman-remote-5.6.0-9.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054499" comment="podman-tests-5.6.0-9.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4683" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23326.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23326.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054500" comment="skopeo-1.20.0-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054501" comment="skopeo-tests-1.20.0-2.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4684" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-13-binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-11083" ref_url="https://www.suse.com/security/cve/CVE-2025-11083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23336.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23336.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11083/">CVE-2025-11083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11083">CVE-2025-11083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054502" comment="gcc-toolset-13-binutils-2.40-21.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054503" comment="gcc-toolset-13-binutils-devel-2.40-21.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054504" comment="gcc-toolset-13-binutils-gold-2.40-21.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4685" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-5642" ref_url="https://www.suse.com/security/cve/CVE-2024-5642/" source="CVE"/>
		<reference ref_id="CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069/" source="CVE"/>
		<reference ref_id="CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075/" source="CVE"/>
		<reference ref_id="CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23342.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23342.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-5642/">CVE-2024-5642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5642">CVE-2024-5642 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054505" comment="python-unversioned-command-3.9.25-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054506" comment="python3-3.9.25-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054507" comment="python3-debug-3.9.25-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054508" comment="python3-devel-3.9.25-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054509" comment="python3-idle-3.9.25-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054510" comment="python3-libs-3.9.25-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054511" comment="python3-test-3.9.25-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054512" comment="python3-tkinter-3.9.25-2.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4686" version="1" class="patch">
	<metadata>
		<title>security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-11083" ref_url="https://www.suse.com/security/cve/CVE-2025-11083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23343.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23343.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11083/">CVE-2025-11083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11083">CVE-2025-11083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054513" comment="binutils-2.35.2-67.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054514" comment="binutils-devel-2.35.2-67.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054515" comment="binutils-gold-2.35.2-67.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4687" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61984" ref_url="https://www.suse.com/security/cve/CVE-2025-61984/" source="CVE"/>
		<reference ref_id="CVE-2025-61985" ref_url="https://www.suse.com/security/cve/CVE-2025-61985/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23480.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23480.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61984/">CVE-2025-61984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61984">CVE-2025-61984 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61985/">CVE-2025-61985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61985">CVE-2025-61985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054516" comment="openssh-8.7p1-47.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054517" comment="openssh-askpass-8.7p1-47.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054518" comment="openssh-clients-8.7p1-47.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054519" comment="openssh-keycat-8.7p1-47.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054520" comment="openssh-server-8.7p1-47.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054521" comment="pam_ssh_agent_auth-0.10.4-5.47.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4688" version="1" class="patch">
	<metadata>
		<title>security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-5987" ref_url="https://www.suse.com/security/cve/CVE-2025-5987/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23483.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23483.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5987/">CVE-2025-5987 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5987">CVE-2025-5987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054522" comment="libssh-0.10.4-17.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054523" comment="libssh-config-0.10.4-17.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054524" comment="libssh-devel-0.10.4-17.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4689" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-1930" ref_url="https://www.suse.com/security/cve/CVE-2025-1930/" source="CVE"/>
		<reference ref_id="CVE-2025-1931" ref_url="https://www.suse.com/security/cve/CVE-2025-1931/" source="CVE"/>
		<reference ref_id="CVE-2025-1932" ref_url="https://www.suse.com/security/cve/CVE-2025-1932/" source="CVE"/>
		<reference ref_id="CVE-2025-1933" ref_url="https://www.suse.com/security/cve/CVE-2025-1933/" source="CVE"/>
		<reference ref_id="CVE-2025-1934" ref_url="https://www.suse.com/security/cve/CVE-2025-1934/" source="CVE"/>
		<reference ref_id="CVE-2025-1935" ref_url="https://www.suse.com/security/cve/CVE-2025-1935/" source="CVE"/>
		<reference ref_id="CVE-2025-1936" ref_url="https://www.suse.com/security/cve/CVE-2025-1936/" source="CVE"/>
		<reference ref_id="CVE-2025-1937" ref_url="https://www.suse.com/security/cve/CVE-2025-1937/" source="CVE"/>
		<reference ref_id="CVE-2025-1938" ref_url="https://www.suse.com/security/cve/CVE-2025-1938/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2359.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2359.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1930/">CVE-2025-1930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1930">CVE-2025-1930 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1931/">CVE-2025-1931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1931">CVE-2025-1931 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1932/">CVE-2025-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1932">CVE-2025-1932 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1933/">CVE-2025-1933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1933">CVE-2025-1933 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1934/">CVE-2025-1934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1934">CVE-2025-1934 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1935/">CVE-2025-1935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1935">CVE-2025-1935 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1936/">CVE-2025-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1936">CVE-2025-1936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1937/">CVE-2025-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1937">CVE-2025-1937 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1938/">CVE-2025-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1938">CVE-2025-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967866" comment="firefox-128.8.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967867" comment="firefox-x11-128.8.0-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4690" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-14174" ref_url="https://www.suse.com/security/cve/CVE-2025-14174/" source="CVE"/>
		<reference ref_id="CVE-2025-43501" ref_url="https://www.suse.com/security/cve/CVE-2025-43501/" source="CVE"/>
		<reference ref_id="CVE-2025-43529" ref_url="https://www.suse.com/security/cve/CVE-2025-43529/" source="CVE"/>
		<reference ref_id="CVE-2025-43531" ref_url="https://www.suse.com/security/cve/CVE-2025-43531/" source="CVE"/>
		<reference ref_id="CVE-2025-43535" ref_url="https://www.suse.com/security/cve/CVE-2025-43535/" source="CVE"/>
		<reference ref_id="CVE-2025-43536" ref_url="https://www.suse.com/security/cve/CVE-2025-43536/" source="CVE"/>
		<reference ref_id="CVE-2025-43541" ref_url="https://www.suse.com/security/cve/CVE-2025-43541/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23700.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23700.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14174/">CVE-2025-14174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14174">CVE-2025-14174 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43501/">CVE-2025-43501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43501">CVE-2025-43501 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43529/">CVE-2025-43529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43529">CVE-2025-43529 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43531/">CVE-2025-43531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43531">CVE-2025-43531 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43535/">CVE-2025-43535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43535">CVE-2025-43535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43536/">CVE-2025-43536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43536">CVE-2025-43536 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43541/">CVE-2025-43541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43541">CVE-2025-43541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054525" comment="webkit2gtk3-2.50.4-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054526" comment="webkit2gtk3-devel-2.50.4-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054527" comment="webkit2gtk3-jsc-2.50.4-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054528" comment="webkit2gtk3-jsc-devel-2.50.4-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4691" version="1" class="patch">
	<metadata>
		<title>security update for mod_md (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-55753" ref_url="https://www.suse.com/security/cve/CVE-2025-55753/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23739.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23739.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55753/">CVE-2025-55753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55753">CVE-2025-55753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054529" comment="mod_md-2.4.26-1.el9_7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4692" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-26625" ref_url="https://www.suse.com/security/cve/CVE-2025-26625/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23744.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23744.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26625/">CVE-2025-26625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26625">CVE-2025-26625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054530" comment="git-lfs-3.6.1-4.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4693" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-14321" ref_url="https://www.suse.com/security/cve/CVE-2025-14321/" source="CVE"/>
		<reference ref_id="CVE-2025-14322" ref_url="https://www.suse.com/security/cve/CVE-2025-14322/" source="CVE"/>
		<reference ref_id="CVE-2025-14323" ref_url="https://www.suse.com/security/cve/CVE-2025-14323/" source="CVE"/>
		<reference ref_id="CVE-2025-14324" ref_url="https://www.suse.com/security/cve/CVE-2025-14324/" source="CVE"/>
		<reference ref_id="CVE-2025-14325" ref_url="https://www.suse.com/security/cve/CVE-2025-14325/" source="CVE"/>
		<reference ref_id="CVE-2025-14328" ref_url="https://www.suse.com/security/cve/CVE-2025-14328/" source="CVE"/>
		<reference ref_id="CVE-2025-14329" ref_url="https://www.suse.com/security/cve/CVE-2025-14329/" source="CVE"/>
		<reference ref_id="CVE-2025-14330" ref_url="https://www.suse.com/security/cve/CVE-2025-14330/" source="CVE"/>
		<reference ref_id="CVE-2025-14331" ref_url="https://www.suse.com/security/cve/CVE-2025-14331/" source="CVE"/>
		<reference ref_id="CVE-2025-14333" ref_url="https://www.suse.com/security/cve/CVE-2025-14333/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23856.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23856.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14321/">CVE-2025-14321 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14321">CVE-2025-14321 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14322/">CVE-2025-14322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14322">CVE-2025-14322 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14323/">CVE-2025-14323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14323">CVE-2025-14323 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14324/">CVE-2025-14324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14324">CVE-2025-14324 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14325/">CVE-2025-14325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14325">CVE-2025-14325 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14328/">CVE-2025-14328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14328">CVE-2025-14328 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14329/">CVE-2025-14329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14329">CVE-2025-14329 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14330/">CVE-2025-14330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14330">CVE-2025-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14331/">CVE-2025-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14331">CVE-2025-14331 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14333/">CVE-2025-14333 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14333">CVE-2025-14333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054531" comment="thunderbird-140.6.0-1.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4694" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-58098" ref_url="https://www.suse.com/security/cve/CVE-2025-58098/" source="CVE"/>
		<reference ref_id="CVE-2025-65082" ref_url="https://www.suse.com/security/cve/CVE-2025-65082/" source="CVE"/>
		<reference ref_id="CVE-2025-66200" ref_url="https://www.suse.com/security/cve/CVE-2025-66200/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23919.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23919.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58098/">CVE-2025-58098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58098">CVE-2025-58098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65082/">CVE-2025-65082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65082">CVE-2025-65082 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66200/">CVE-2025-66200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66200">CVE-2025-66200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054532" comment="httpd-2.4.62-7.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054533" comment="httpd-core-2.4.62-7.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054534" comment="httpd-devel-2.4.62-7.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054535" comment="httpd-filesystem-2.4.62-7.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054536" comment="httpd-manual-2.4.62-7.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054537" comment="httpd-tools-2.4.62-7.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054538" comment="mod_ldap-2.4.62-7.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054539" comment="mod_lua-2.4.62-7.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054540" comment="mod_proxy_html-2.4.62-7.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054541" comment="mod_session-2.4.62-7.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054542" comment="mod_ssl-2.4.62-7.el9_7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4695" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-52804" ref_url="https://www.suse.com/security/cve/CVE-2024-52804/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2471.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2471.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52804/">CVE-2024-52804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52804">CVE-2024-52804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968349" comment="pcs-0.11.8-1.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968350" comment="pcs-snmp-0.11.8-1.el9_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4696" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-26594" ref_url="https://www.suse.com/security/cve/CVE-2025-26594/" source="CVE"/>
		<reference ref_id="CVE-2025-26595" ref_url="https://www.suse.com/security/cve/CVE-2025-26595/" source="CVE"/>
		<reference ref_id="CVE-2025-26596" ref_url="https://www.suse.com/security/cve/CVE-2025-26596/" source="CVE"/>
		<reference ref_id="CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597/" source="CVE"/>
		<reference ref_id="CVE-2025-26598" ref_url="https://www.suse.com/security/cve/CVE-2025-26598/" source="CVE"/>
		<reference ref_id="CVE-2025-26599" ref_url="https://www.suse.com/security/cve/CVE-2025-26599/" source="CVE"/>
		<reference ref_id="CVE-2025-26600" ref_url="https://www.suse.com/security/cve/CVE-2025-26600/" source="CVE"/>
		<reference ref_id="CVE-2025-26601" ref_url="https://www.suse.com/security/cve/CVE-2025-26601/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2500.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2500.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-26594/">CVE-2025-26594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26594">CVE-2025-26594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26595/">CVE-2025-26595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26595">CVE-2025-26595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26596/">CVE-2025-26596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26596">CVE-2025-26596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26598/">CVE-2025-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26598">CVE-2025-26598 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26599/">CVE-2025-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26599">CVE-2025-26599 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26600/">CVE-2025-26600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26600">CVE-2025-26600 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26601/">CVE-2025-26601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26601">CVE-2025-26601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967979" comment="tigervnc-1.14.1-1.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967980" comment="tigervnc-icons-1.14.1-1.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967981" comment="tigervnc-license-1.14.1-1.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967982" comment="tigervnc-selinux-1.14.1-1.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967983" comment="tigervnc-server-1.14.1-1.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967984" comment="tigervnc-server-minimal-1.14.1-1.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967985" comment="tigervnc-server-module-1.14.1-1.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4697" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-52605" ref_url="https://www.suse.com/security/cve/CVE-2023-52605/" source="CVE"/>
		<reference ref_id="CVE-2023-52922" ref_url="https://www.suse.com/security/cve/CVE-2023-52922/" source="CVE"/>
		<reference ref_id="CVE-2024-50264" ref_url="https://www.suse.com/security/cve/CVE-2024-50264/" source="CVE"/>
		<reference ref_id="CVE-2024-50302" ref_url="https://www.suse.com/security/cve/CVE-2024-50302/" source="CVE"/>
		<reference ref_id="CVE-2024-53113" ref_url="https://www.suse.com/security/cve/CVE-2024-53113/" source="CVE"/>
		<reference ref_id="CVE-2024-53197" ref_url="https://www.suse.com/security/cve/CVE-2024-53197/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2627.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2627.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52605/">CVE-2023-52605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52605">CVE-2023-52605 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52922/">CVE-2023-52922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52922">CVE-2023-52922 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50264/">CVE-2024-50264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50302/">CVE-2024-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53113/">CVE-2024-53113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53113">CVE-2024-53113 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53197/">CVE-2024-53197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53197">CVE-2024-53197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968351" comment="bpftool-7.4.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968352" comment="kernel-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968353" comment="kernel-abi-stablelists-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968354" comment="kernel-core-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968355" comment="kernel-cross-headers-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968356" comment="kernel-debug-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968357" comment="kernel-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968360" comment="kernel-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968361" comment="kernel-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968362" comment="kernel-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968363" comment="kernel-debug-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968366" comment="kernel-doc-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968367" comment="kernel-headers-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968368" comment="kernel-modules-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968369" comment="kernel-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968370" comment="kernel-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968371" comment="kernel-rt-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968372" comment="kernel-rt-core-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968373" comment="kernel-rt-debug-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968374" comment="kernel-rt-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968376" comment="kernel-rt-debug-kvm-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968377" comment="kernel-rt-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968378" comment="kernel-rt-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968379" comment="kernel-rt-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968381" comment="kernel-rt-kvm-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968382" comment="kernel-rt-modules-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968383" comment="kernel-rt-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968384" comment="kernel-rt-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968385" comment="kernel-tools-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968386" comment="kernel-tools-libs-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968388" comment="kernel-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968389" comment="kernel-uki-virt-addons-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968390" comment="libperf-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968391" comment="perf-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968392" comment="python3-perf-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968393" comment="rtla-5.14.0-503.31.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968394" comment="rv-5.14.0-503.31.1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4698" version="1" class="patch">
	<metadata>
		<title>security update for dotnet9.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-24070" ref_url="https://www.suse.com/security/cve/CVE-2025-24070/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2668.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2668.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24070/">CVE-2025-24070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24070">CVE-2025-24070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968395" comment="aspnetcore-runtime-9.0-9.0.3-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968396" comment="aspnetcore-runtime-dbg-9.0-9.0.3-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968397" comment="aspnetcore-targeting-pack-9.0-9.0.3-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968398" comment="dotnet-apphost-pack-9.0-9.0.3-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968399" comment="dotnet-host-9.0.3-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968400" comment="dotnet-hostfxr-9.0-9.0.3-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968401" comment="dotnet-runtime-9.0-9.0.3-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968402" comment="dotnet-runtime-dbg-9.0-9.0.3-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968403" comment="dotnet-sdk-9.0-9.0.104-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968404" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.104-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968405" comment="dotnet-sdk-aot-9.0-9.0.104-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968406" comment="dotnet-sdk-dbg-9.0-9.0.104-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968407" comment="dotnet-targeting-pack-9.0-9.0.3-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968408" comment="dotnet-templates-9.0-9.0.104-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968409" comment="netstandard-targeting-pack-2.1-9.0.104-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4699" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-24070" ref_url="https://www.suse.com/security/cve/CVE-2025-24070/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2669.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2669.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24070/">CVE-2025-24070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24070">CVE-2025-24070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968410" comment="aspnetcore-runtime-8.0-8.0.14-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968411" comment="aspnetcore-runtime-dbg-8.0-8.0.14-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968412" comment="aspnetcore-targeting-pack-8.0-8.0.14-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968413" comment="dotnet-apphost-pack-8.0-8.0.14-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968414" comment="dotnet-hostfxr-8.0-8.0.14-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968415" comment="dotnet-runtime-8.0-8.0.14-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968416" comment="dotnet-runtime-dbg-8.0-8.0.14-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968417" comment="dotnet-sdk-8.0-8.0.114-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968418" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.114-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968419" comment="dotnet-sdk-dbg-8.0-8.0.114-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968420" comment="dotnet-targeting-pack-8.0-8.0.14-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968421" comment="dotnet-templates-8.0-8.0.114-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4700" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-56171" ref_url="https://www.suse.com/security/cve/CVE-2024-56171/" source="CVE"/>
		<reference ref_id="CVE-2025-24928" ref_url="https://www.suse.com/security/cve/CVE-2025-24928/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2679.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2679.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56171/">CVE-2024-56171 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24928/">CVE-2025-24928 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968422" comment="libxml2-2.9.13-6.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968423" comment="libxml2-devel-2.9.13-6.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968424" comment="python3-libxml2-2.9.13-6.el9_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4701" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-24201" ref_url="https://www.suse.com/security/cve/CVE-2025-24201/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2864.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2864.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24201/">CVE-2025-24201 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24201">CVE-2025-24201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968425" comment="webkit2gtk3-2.46.6-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968426" comment="webkit2gtk3-devel-2.46.6-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968427" comment="webkit2gtk3-jsc-2.46.6-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968428" comment="webkit2gtk3-jsc-devel-2.46.6-2.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4702" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-0624" ref_url="https://www.suse.com/security/cve/CVE-2025-0624/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2867.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2867.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0624/">CVE-2025-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0624">CVE-2025-0624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968429" comment="grub2-common-2.06-94.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968430" comment="grub2-efi-x64-2.06-94.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968431" comment="grub2-efi-x64-cdboot-2.06-94.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968432" comment="grub2-efi-x64-modules-2.06-94.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968433" comment="grub2-pc-2.06-94.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968434" comment="grub2-pc-modules-2.06-94.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968435" comment="grub2-tools-2.06-94.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968436" comment="grub2-tools-efi-2.06-94.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968437" comment="grub2-tools-extra-2.06-94.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968438" comment="grub2-tools-minimal-2.06-94.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4703" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-1937" ref_url="https://www.suse.com/security/cve/CVE-2025-1937/" source="CVE"/>
		<reference ref_id="CVE-2025-1938" ref_url="https://www.suse.com/security/cve/CVE-2025-1938/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2899.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2899.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1937/">CVE-2025-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1937">CVE-2025-1937 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1938/">CVE-2025-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1938">CVE-2025-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968439" comment="thunderbird-128.8.0-2.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4704" version="1" class="patch">
	<metadata>
		<title>security update for libxslt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-24855" ref_url="https://www.suse.com/security/cve/CVE-2025-24855/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3107.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3107.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24855/">CVE-2025-24855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24855">CVE-2025-24855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969562" comment="libxslt-1.1.34-9.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969563" comment="libxslt-devel-1.1.34-9.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4705" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-27516" ref_url="https://www.suse.com/security/cve/CVE-2025-27516/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3113.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3113.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-27516/">CVE-2025-27516 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27516">CVE-2025-27516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970406" comment="fence-agents-aliyun-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970407" comment="fence-agents-all-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970408" comment="fence-agents-amt-ws-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970409" comment="fence-agents-apc-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970410" comment="fence-agents-apc-snmp-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970411" comment="fence-agents-aws-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970412" comment="fence-agents-azure-arm-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970413" comment="fence-agents-bladecenter-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970414" comment="fence-agents-brocade-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970415" comment="fence-agents-cisco-mds-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970416" comment="fence-agents-cisco-ucs-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970417" comment="fence-agents-common-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970418" comment="fence-agents-compute-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970419" comment="fence-agents-drac5-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970420" comment="fence-agents-eaton-snmp-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970421" comment="fence-agents-emerson-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970422" comment="fence-agents-eps-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970423" comment="fence-agents-gce-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970424" comment="fence-agents-heuristics-ping-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970425" comment="fence-agents-hpblade-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970426" comment="fence-agents-ibm-powervs-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970427" comment="fence-agents-ibm-vpc-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970428" comment="fence-agents-ibmblade-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970429" comment="fence-agents-ifmib-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970430" comment="fence-agents-ilo-moonshot-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970431" comment="fence-agents-ilo-mp-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970432" comment="fence-agents-ilo-ssh-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970433" comment="fence-agents-ilo2-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970434" comment="fence-agents-intelmodular-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970435" comment="fence-agents-ipdu-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970436" comment="fence-agents-ipmilan-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970437" comment="fence-agents-kdump-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970438" comment="fence-agents-kubevirt-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970439" comment="fence-agents-mpath-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970440" comment="fence-agents-openstack-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970441" comment="fence-agents-redfish-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970442" comment="fence-agents-rhevm-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970443" comment="fence-agents-rsa-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970444" comment="fence-agents-rsb-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970445" comment="fence-agents-sbd-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970446" comment="fence-agents-scsi-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970447" comment="fence-agents-virsh-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970448" comment="fence-agents-vmware-rest-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970449" comment="fence-agents-vmware-soap-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970450" comment="fence-agents-wti-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970451" comment="fence-virt-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970452" comment="fence-virtd-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970453" comment="fence-virtd-cpg-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970454" comment="fence-virtd-libvirt-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970455" comment="fence-virtd-multicast-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970456" comment="fence-virtd-serial-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970457" comment="fence-virtd-tcp-4.10.0-76.el9_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970458" comment="ha-cloud-support-4.10.0-76.el9_5.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4706" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21785" ref_url="https://www.suse.com/security/cve/CVE-2025-21785/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3208.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3208.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21785/">CVE-2025-21785 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21785">CVE-2025-21785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970459" comment="bpftool-7.4.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970460" comment="kernel-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970461" comment="kernel-abi-stablelists-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970462" comment="kernel-core-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970463" comment="kernel-cross-headers-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970464" comment="kernel-debug-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970465" comment="kernel-debug-core-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970468" comment="kernel-debug-modules-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970469" comment="kernel-debug-modules-core-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970470" comment="kernel-debug-modules-extra-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970471" comment="kernel-debug-uki-virt-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970474" comment="kernel-doc-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970475" comment="kernel-headers-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970476" comment="kernel-modules-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970477" comment="kernel-modules-core-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970478" comment="kernel-modules-extra-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970479" comment="kernel-rt-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970480" comment="kernel-rt-core-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970481" comment="kernel-rt-debug-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970482" comment="kernel-rt-debug-core-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970484" comment="kernel-rt-debug-kvm-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970485" comment="kernel-rt-debug-modules-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970486" comment="kernel-rt-debug-modules-core-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970487" comment="kernel-rt-debug-modules-extra-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970489" comment="kernel-rt-kvm-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970490" comment="kernel-rt-modules-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970491" comment="kernel-rt-modules-core-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970492" comment="kernel-rt-modules-extra-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970493" comment="kernel-tools-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970494" comment="kernel-tools-libs-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970496" comment="kernel-uki-virt-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970497" comment="kernel-uki-virt-addons-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970498" comment="libperf-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970499" comment="perf-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970500" comment="python3-perf-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970501" comment="rtla-5.14.0-503.34.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970502" comment="rv-5.14.0-503.34.1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4707" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-7347" ref_url="https://www.suse.com/security/cve/CVE-2024-7347/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3261.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3261.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7347/">CVE-2024-7347 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7347">CVE-2024-7347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970634" comment="nginx-1.22.1-8.module+el9.5.0+22953+b175c265.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970635" comment="nginx-all-modules-1.22.1-8.module+el9.5.0+22953+b175c265.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970636" comment="nginx-core-1.22.1-8.module+el9.5.0+22953+b175c265.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970637" comment="nginx-filesystem-1.22.1-8.module+el9.5.0+22953+b175c265.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970638" comment="nginx-mod-devel-1.22.1-8.module+el9.5.0+22953+b175c265.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970639" comment="nginx-mod-http-image-filter-1.22.1-8.module+el9.5.0+22953+b175c265.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970640" comment="nginx-mod-http-perl-1.22.1-8.module+el9.5.0+22953+b175c265.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970641" comment="nginx-mod-http-xslt-filter-1.22.1-8.module+el9.5.0+22953+b175c265.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970642" comment="nginx-mod-mail-1.22.1-8.module+el9.5.0+22953+b175c265.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970643" comment="nginx-mod-stream-1.22.1-8.module+el9.5.0+22953+b175c265.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4708" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-7347" ref_url="https://www.suse.com/security/cve/CVE-2024-7347/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3262.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3262.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7347/">CVE-2024-7347 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7347">CVE-2024-7347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974172" comment="nginx-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974173" comment="nginx-all-modules-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974174" comment="nginx-core-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974175" comment="nginx-filesystem-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974176" comment="nginx-mod-devel-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974177" comment="nginx-mod-http-image-filter-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974178" comment="nginx-mod-http-perl-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974179" comment="nginx-mod-http-xslt-filter-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974180" comment="nginx-mod-mail-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974181" comment="nginx-mod-stream-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4709" version="1" class="patch">
	<metadata>
		<title>security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3336.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3336.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974182" comment="podman-5.2.2-15.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974183" comment="podman-docker-5.2.2-15.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974184" comment="podman-plugins-5.2.2-15.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974185" comment="podman-remote-5.2.2-15.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974186" comment="podman-tests-5.2.2-15.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4710" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3344.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3344.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970644" comment="grafana-10.2.6-9.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970645" comment="grafana-selinux-10.2.6-9.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4711" version="1" class="patch">
	<metadata>
		<title>security update for python-jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-27516" ref_url="https://www.suse.com/security/cve/CVE-2025-27516/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3406.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3406.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-27516/">CVE-2025-27516 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27516">CVE-2025-27516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974187" comment="python3-jinja2-2.11.3-8.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4712" version="1" class="patch">
	<metadata>
		<title>security update for freetype (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-27363" ref_url="https://www.suse.com/security/cve/CVE-2025-27363/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3407.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3407.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27363/">CVE-2025-27363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27363">CVE-2025-27363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974188" comment="freetype-2.10.4-10.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974189" comment="freetype-devel-2.10.4-10.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4713" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-43855" ref_url="https://www.suse.com/security/cve/CVE-2024-43855/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3506.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3506.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43855/">CVE-2024-43855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43855">CVE-2024-43855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974395" comment="bpftool-7.4.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974396" comment="kernel-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974397" comment="kernel-abi-stablelists-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974398" comment="kernel-core-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974399" comment="kernel-cross-headers-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974400" comment="kernel-debug-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974401" comment="kernel-debug-core-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974404" comment="kernel-debug-modules-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974405" comment="kernel-debug-modules-core-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974406" comment="kernel-debug-modules-extra-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974407" comment="kernel-debug-uki-virt-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974410" comment="kernel-doc-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974411" comment="kernel-headers-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974412" comment="kernel-modules-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974413" comment="kernel-modules-core-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974414" comment="kernel-modules-extra-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974415" comment="kernel-rt-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974416" comment="kernel-rt-core-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974417" comment="kernel-rt-debug-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974418" comment="kernel-rt-debug-core-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974420" comment="kernel-rt-debug-kvm-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974421" comment="kernel-rt-debug-modules-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974422" comment="kernel-rt-debug-modules-core-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974423" comment="kernel-rt-debug-modules-extra-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974425" comment="kernel-rt-kvm-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974426" comment="kernel-rt-modules-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974427" comment="kernel-rt-modules-core-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974428" comment="kernel-rt-modules-extra-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974429" comment="kernel-tools-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974430" comment="kernel-tools-libs-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974432" comment="kernel-uki-virt-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974433" comment="kernel-uki-virt-addons-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974434" comment="libperf-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974435" comment="perf-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974436" comment="python3-perf-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974437" comment="rtla-5.14.0-503.35.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974438" comment="rv-5.14.0-503.35.1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4714" version="1" class="patch">
	<metadata>
		<title>security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-8176" ref_url="https://www.suse.com/security/cve/CVE-2024-8176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3531.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3531.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8176/">CVE-2024-8176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8176">CVE-2024-8176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974190" comment="expat-2.5.0-3.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974191" comment="expat-devel-2.5.0-3.el9_5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4715" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-3028" ref_url="https://www.suse.com/security/cve/CVE-2025-3028/" source="CVE"/>
		<reference ref_id="CVE-2025-3029" ref_url="https://www.suse.com/security/cve/CVE-2025-3029/" source="CVE"/>
		<reference ref_id="CVE-2025-3030" ref_url="https://www.suse.com/security/cve/CVE-2025-3030/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3556.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3556.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3028/">CVE-2025-3028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3028">CVE-2025-3028 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3029/">CVE-2025-3029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3029">CVE-2025-3029 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-3030/">CVE-2025-3030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3030">CVE-2025-3030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974192" comment="firefox-128.9.0-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974193" comment="firefox-x11-128.9.0-2.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4716" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44441" ref_url="https://www.suse.com/security/cve/CVE-2023-44441/" source="CVE"/>
		<reference ref_id="CVE-2023-44442" ref_url="https://www.suse.com/security/cve/CVE-2023-44442/" source="CVE"/>
		<reference ref_id="CVE-2023-44443" ref_url="https://www.suse.com/security/cve/CVE-2023-44443/" source="CVE"/>
		<reference ref_id="CVE-2023-44444" ref_url="https://www.suse.com/security/cve/CVE-2023-44444/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3617.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3617.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44441/">CVE-2023-44441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44441">CVE-2023-44441 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44442/">CVE-2023-44442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44442">CVE-2023-44442 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44443/">CVE-2023-44443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44443">CVE-2023-44443 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-44444/">CVE-2023-44444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44444">CVE-2023-44444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974497" comment="gimp-2.99.8-4.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974498" comment="gimp-libs-2.99.8-4.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4717" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3631.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3631.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974499" comment="python3.12-3.12.5-2.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974500" comment="python3.12-debug-3.12.5-2.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974501" comment="python3.12-devel-3.12.5-2.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974502" comment="python3.12-idle-3.12.5-2.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974503" comment="python3.12-libs-3.12.5-2.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974504" comment="python3.12-test-3.12.5-2.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974505" comment="python3.12-tkinter-3.12.5-2.el9_5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4718" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3634.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3634.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974606" comment="python3.11-3.11.9-7.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974607" comment="python3.11-debug-3.11.9-7.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974608" comment="python3.11-devel-3.11.9-7.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974609" comment="python3.11-idle-3.11.9-7.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974610" comment="python3.11-libs-3.11.9-7.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974611" comment="python3.11-test-3.11.9-7.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974612" comment="python3.11-tkinter-3.11.9-7.el9_5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4719" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-50379" ref_url="https://www.suse.com/security/cve/CVE-2024-50379/" source="CVE"/>
		<reference ref_id="CVE-2025-24813" ref_url="https://www.suse.com/security/cve/CVE-2025-24813/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3645.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3645.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50379/">CVE-2024-50379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50379">CVE-2024-50379 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24813/">CVE-2025-24813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24813">CVE-2025-24813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974613" comment="tomcat-9.0.87-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974614" comment="tomcat-admin-webapps-9.0.87-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974615" comment="tomcat-docs-webapp-9.0.87-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974616" comment="tomcat-el-3.0-api-9.0.87-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974617" comment="tomcat-jsp-2.3-api-9.0.87-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974618" comment="tomcat-lib-9.0.87-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974619" comment="tomcat-servlet-4.0-api-9.0.87-2.el9_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974620" comment="tomcat-webapps-9.0.87-2.el9_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4720" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-44192" ref_url="https://www.suse.com/security/cve/CVE-2024-44192/" source="CVE"/>
		<reference ref_id="CVE-2024-54467" ref_url="https://www.suse.com/security/cve/CVE-2024-54467/" source="CVE"/>
		<reference ref_id="CVE-2024-54551" ref_url="https://www.suse.com/security/cve/CVE-2024-54551/" source="CVE"/>
		<reference ref_id="CVE-2025-24189" ref_url="https://www.suse.com/security/cve/CVE-2025-24189/" source="CVE"/>
		<reference ref_id="CVE-2025-24208" ref_url="https://www.suse.com/security/cve/CVE-2025-24208/" source="CVE"/>
		<reference ref_id="CVE-2025-24209" ref_url="https://www.suse.com/security/cve/CVE-2025-24209/" source="CVE"/>
		<reference ref_id="CVE-2025-24216" ref_url="https://www.suse.com/security/cve/CVE-2025-24216/" source="CVE"/>
		<reference ref_id="CVE-2025-30427" ref_url="https://www.suse.com/security/cve/CVE-2025-30427/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3713.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3713.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44192/">CVE-2024-44192 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44192">CVE-2024-44192 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54467/">CVE-2024-54467 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54467">CVE-2024-54467 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54551/">CVE-2024-54551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54551">CVE-2024-54551 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24189/">CVE-2025-24189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24189">CVE-2025-24189 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24208/">CVE-2025-24208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24208">CVE-2025-24208 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24209/">CVE-2025-24209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24209">CVE-2025-24209 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24216/">CVE-2025-24216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24216">CVE-2025-24216 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30427/">CVE-2025-30427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30427">CVE-2025-30427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974759" comment="webkit2gtk3-2.48.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974760" comment="webkit2gtk3-devel-2.48.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974761" comment="webkit2gtk3-jsc-2.48.1-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974762" comment="webkit2gtk3-jsc-devel-2.48.1-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4721" version="1" class="patch">
	<metadata>
		<title>security update for delve (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-45336" ref_url="https://www.suse.com/security/cve/CVE-2024-45336/" source="CVE"/>
		<reference ref_id="CVE-2024-45341" ref_url="https://www.suse.com/security/cve/CVE-2024-45341/" source="CVE"/>
		<reference ref_id="CVE-2025-22866" ref_url="https://www.suse.com/security/cve/CVE-2025-22866/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3773.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3773.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45336/">CVE-2024-45336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45336">CVE-2024-45336 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45341/">CVE-2024-45341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45341">CVE-2024-45341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22866/">CVE-2025-22866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22866">CVE-2025-22866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974982" comment="delve-1.24.1-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974983" comment="go-toolset-1.23.6-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974984" comment="golang-1.23.6-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974985" comment="golang-bin-1.23.6-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974986" comment="golang-docs-1.23.6-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974987" comment="golang-misc-1.23.6-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974988" comment="golang-race-1.23.6-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974989" comment="golang-src-1.23.6-2.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974990" comment="golang-tests-1.23.6-2.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4722" version="1" class="patch">
	<metadata>
		<title>security update for gvisor-tap-vsock (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3833.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3833.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976053" comment="gvisor-tap-vsock-0.8.5-1.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4723" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3845.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3845.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976014" comment="java-1.8.0-openjdk-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976015" comment="java-1.8.0-openjdk-accessibility-1.8.0.452.b09-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976016" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.452.b09-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976017" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.452.b09-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976018" comment="java-1.8.0-openjdk-demo-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976019" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976020" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976021" comment="java-1.8.0-openjdk-devel-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976022" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976023" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976024" comment="java-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976025" comment="java-1.8.0-openjdk-headless-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976026" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976027" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976028" comment="java-1.8.0-openjdk-javadoc-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976029" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976030" comment="java-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976031" comment="java-1.8.0-openjdk-src-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976032" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976033" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4724" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3848.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3848.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999610" comment="java-11-openjdk-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999549" comment="java-11-openjdk-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999611" comment="java-11-openjdk-demo-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999551" comment="java-11-openjdk-demo-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999552" comment="java-11-openjdk-demo-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999553" comment="java-11-openjdk-demo-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999612" comment="java-11-openjdk-devel-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999555" comment="java-11-openjdk-devel-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999556" comment="java-11-openjdk-devel-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999557" comment="java-11-openjdk-devel-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999558" comment="java-11-openjdk-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999613" comment="java-11-openjdk-headless-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999560" comment="java-11-openjdk-headless-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999561" comment="java-11-openjdk-headless-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999562" comment="java-11-openjdk-headless-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999614" comment="java-11-openjdk-javadoc-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999564" comment="java-11-openjdk-javadoc-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999615" comment="java-11-openjdk-javadoc-zip-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999566" comment="java-11-openjdk-javadoc-zip-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999616" comment="java-11-openjdk-jmods-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999568" comment="java-11-openjdk-jmods-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999569" comment="java-11-openjdk-jmods-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999570" comment="java-11-openjdk-jmods-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999571" comment="java-11-openjdk-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999617" comment="java-11-openjdk-src-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999573" comment="java-11-openjdk-src-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999574" comment="java-11-openjdk-src-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999575" comment="java-11-openjdk-src-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999618" comment="java-11-openjdk-static-libs-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999577" comment="java-11-openjdk-static-libs-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999578" comment="java-11-openjdk-static-libs-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999579" comment="java-11-openjdk-static-libs-slowdebug-11.0.27.0.6-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4725" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3852.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3852.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976149" comment="java-17-openjdk-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976150" comment="java-17-openjdk-demo-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976151" comment="java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976152" comment="java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976153" comment="java-17-openjdk-devel-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976154" comment="java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976155" comment="java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976156" comment="java-17-openjdk-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976157" comment="java-17-openjdk-headless-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976158" comment="java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976159" comment="java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976160" comment="java-17-openjdk-javadoc-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976161" comment="java-17-openjdk-javadoc-zip-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976162" comment="java-17-openjdk-jmods-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976163" comment="java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976164" comment="java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976165" comment="java-17-openjdk-slowdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976166" comment="java-17-openjdk-src-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976167" comment="java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976168" comment="java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976169" comment="java-17-openjdk-static-libs-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976170" comment="java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976171" comment="java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4726" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3855.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3855.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976253" comment="java-21-openjdk-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976254" comment="java-21-openjdk-demo-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976255" comment="java-21-openjdk-demo-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976256" comment="java-21-openjdk-demo-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976257" comment="java-21-openjdk-devel-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976258" comment="java-21-openjdk-devel-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976259" comment="java-21-openjdk-devel-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976260" comment="java-21-openjdk-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976261" comment="java-21-openjdk-headless-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976262" comment="java-21-openjdk-headless-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976263" comment="java-21-openjdk-headless-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976264" comment="java-21-openjdk-javadoc-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976265" comment="java-21-openjdk-javadoc-zip-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976266" comment="java-21-openjdk-jmods-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976267" comment="java-21-openjdk-jmods-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976268" comment="java-21-openjdk-jmods-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976269" comment="java-21-openjdk-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976270" comment="java-21-openjdk-src-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976271" comment="java-21-openjdk-src-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976272" comment="java-21-openjdk-src-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976273" comment="java-21-openjdk-static-libs-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976274" comment="java-21-openjdk-static-libs-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976275" comment="java-21-openjdk-static-libs-slowdebug-21.0.7.0.6-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4727" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-53150" ref_url="https://www.suse.com/security/cve/CVE-2024-53150/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3937.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3937.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53150/">CVE-2024-53150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53150">CVE-2024-53150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975729" comment="bpftool-7.4.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975730" comment="kernel-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975731" comment="kernel-abi-stablelists-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975732" comment="kernel-core-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975733" comment="kernel-cross-headers-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975734" comment="kernel-debug-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975735" comment="kernel-debug-core-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975738" comment="kernel-debug-modules-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975739" comment="kernel-debug-modules-core-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975740" comment="kernel-debug-modules-extra-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975741" comment="kernel-debug-uki-virt-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975744" comment="kernel-doc-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975745" comment="kernel-headers-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975746" comment="kernel-modules-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975747" comment="kernel-modules-core-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975748" comment="kernel-modules-extra-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975749" comment="kernel-rt-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975750" comment="kernel-rt-core-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975751" comment="kernel-rt-debug-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975752" comment="kernel-rt-debug-core-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975754" comment="kernel-rt-debug-kvm-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975755" comment="kernel-rt-debug-modules-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975756" comment="kernel-rt-debug-modules-core-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975757" comment="kernel-rt-debug-modules-extra-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975759" comment="kernel-rt-kvm-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975760" comment="kernel-rt-modules-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975761" comment="kernel-rt-modules-core-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975762" comment="kernel-rt-modules-extra-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975763" comment="kernel-tools-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975764" comment="kernel-tools-libs-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975766" comment="kernel-uki-virt-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975767" comment="kernel-uki-virt-addons-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975768" comment="libperf-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975769" comment="perf-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975770" comment="python3-perf-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975771" comment="rtla-5.14.0-503.38.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975772" comment="rv-5.14.0-503.38.1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4728" version="1" class="patch">
	<metadata>
		<title>security update for libxslt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-55549" ref_url="https://www.suse.com/security/cve/CVE-2024-55549/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4025.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4025.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-55549/">CVE-2024-55549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976045" comment="libxslt-1.1.34-9.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976046" comment="libxslt-devel-1.1.34-9.el9_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4729" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-3028" ref_url="https://www.suse.com/security/cve/CVE-2025-3028/" source="CVE"/>
		<reference ref_id="CVE-2025-3029" ref_url="https://www.suse.com/security/cve/CVE-2025-3029/" source="CVE"/>
		<reference ref_id="CVE-2025-3030" ref_url="https://www.suse.com/security/cve/CVE-2025-3030/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4169.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4169.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3028/">CVE-2025-3028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3028">CVE-2025-3028 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3029/">CVE-2025-3029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3029">CVE-2025-3029 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-3030/">CVE-2025-3030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3030">CVE-2025-3030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976400" comment="thunderbird-128.9.0-2.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4730" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-2830" ref_url="https://www.suse.com/security/cve/CVE-2025-2830/" source="CVE"/>
		<reference ref_id="CVE-2025-3522" ref_url="https://www.suse.com/security/cve/CVE-2025-3522/" source="CVE"/>
		<reference ref_id="CVE-2025-3523" ref_url="https://www.suse.com/security/cve/CVE-2025-3523/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4229.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4229.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="4.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2830/">CVE-2025-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2830">CVE-2025-2830 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3522/">CVE-2025-3522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3522">CVE-2025-3522 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3523/">CVE-2025-3523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3523">CVE-2025-3523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976562" comment="thunderbird-128.9.2-1.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4731" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-0395" ref_url="https://www.suse.com/security/cve/CVE-2025-0395/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4244.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4244.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0395/">CVE-2025-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976563" comment="glibc-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976564" comment="glibc-all-langpacks-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976565" comment="glibc-benchtests-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976566" comment="glibc-common-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976567" comment="glibc-devel-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976568" comment="glibc-doc-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976569" comment="glibc-gconv-extra-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976570" comment="glibc-headers-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976571" comment="glibc-langpack-aa-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976572" comment="glibc-langpack-af-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976573" comment="glibc-langpack-agr-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976574" comment="glibc-langpack-ak-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976575" comment="glibc-langpack-am-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976576" comment="glibc-langpack-an-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976577" comment="glibc-langpack-anp-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976578" comment="glibc-langpack-ar-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976579" comment="glibc-langpack-as-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976580" comment="glibc-langpack-ast-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976581" comment="glibc-langpack-ayc-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976582" comment="glibc-langpack-az-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976583" comment="glibc-langpack-be-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976584" comment="glibc-langpack-bem-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976585" comment="glibc-langpack-ber-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976586" comment="glibc-langpack-bg-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976587" comment="glibc-langpack-bhb-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976588" comment="glibc-langpack-bho-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976589" comment="glibc-langpack-bi-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976590" comment="glibc-langpack-bn-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976591" comment="glibc-langpack-bo-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976592" comment="glibc-langpack-br-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976593" comment="glibc-langpack-brx-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976594" comment="glibc-langpack-bs-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976595" comment="glibc-langpack-byn-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976596" comment="glibc-langpack-ca-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976597" comment="glibc-langpack-ce-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976598" comment="glibc-langpack-chr-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976599" comment="glibc-langpack-ckb-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976600" comment="glibc-langpack-cmn-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976601" comment="glibc-langpack-crh-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976602" comment="glibc-langpack-cs-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976603" comment="glibc-langpack-csb-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976604" comment="glibc-langpack-cv-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976605" comment="glibc-langpack-cy-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976606" comment="glibc-langpack-da-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976607" comment="glibc-langpack-de-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976608" comment="glibc-langpack-doi-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976609" comment="glibc-langpack-dsb-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976610" comment="glibc-langpack-dv-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976611" comment="glibc-langpack-dz-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976612" comment="glibc-langpack-el-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976613" comment="glibc-langpack-en-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976614" comment="glibc-langpack-eo-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976615" comment="glibc-langpack-es-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976616" comment="glibc-langpack-et-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976617" comment="glibc-langpack-eu-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976618" comment="glibc-langpack-fa-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976619" comment="glibc-langpack-ff-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976620" comment="glibc-langpack-fi-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976621" comment="glibc-langpack-fil-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976622" comment="glibc-langpack-fo-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976623" comment="glibc-langpack-fr-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976624" comment="glibc-langpack-fur-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976625" comment="glibc-langpack-fy-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976626" comment="glibc-langpack-ga-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976627" comment="glibc-langpack-gd-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976628" comment="glibc-langpack-gez-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976629" comment="glibc-langpack-gl-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976630" comment="glibc-langpack-gu-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976631" comment="glibc-langpack-gv-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976632" comment="glibc-langpack-ha-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976633" comment="glibc-langpack-hak-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976634" comment="glibc-langpack-he-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976635" comment="glibc-langpack-hi-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976636" comment="glibc-langpack-hif-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976637" comment="glibc-langpack-hne-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976638" comment="glibc-langpack-hr-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976639" comment="glibc-langpack-hsb-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976640" comment="glibc-langpack-ht-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976641" comment="glibc-langpack-hu-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976642" comment="glibc-langpack-hy-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976643" comment="glibc-langpack-ia-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976644" comment="glibc-langpack-id-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976645" comment="glibc-langpack-ig-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976646" comment="glibc-langpack-ik-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976647" comment="glibc-langpack-is-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976648" comment="glibc-langpack-it-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976649" comment="glibc-langpack-iu-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976650" comment="glibc-langpack-ja-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976651" comment="glibc-langpack-ka-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976652" comment="glibc-langpack-kab-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976653" comment="glibc-langpack-kk-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976654" comment="glibc-langpack-kl-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976655" comment="glibc-langpack-km-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976656" comment="glibc-langpack-kn-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976657" comment="glibc-langpack-ko-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976658" comment="glibc-langpack-kok-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976659" comment="glibc-langpack-ks-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976660" comment="glibc-langpack-ku-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976661" comment="glibc-langpack-kw-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976662" comment="glibc-langpack-ky-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976663" comment="glibc-langpack-lb-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976664" comment="glibc-langpack-lg-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976665" comment="glibc-langpack-li-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976666" comment="glibc-langpack-lij-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976667" comment="glibc-langpack-ln-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976668" comment="glibc-langpack-lo-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976669" comment="glibc-langpack-lt-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976670" comment="glibc-langpack-lv-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976671" comment="glibc-langpack-lzh-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976672" comment="glibc-langpack-mag-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976673" comment="glibc-langpack-mai-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976674" comment="glibc-langpack-mfe-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976675" comment="glibc-langpack-mg-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976676" comment="glibc-langpack-mhr-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976677" comment="glibc-langpack-mi-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976678" comment="glibc-langpack-miq-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976679" comment="glibc-langpack-mjw-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976680" comment="glibc-langpack-mk-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976681" comment="glibc-langpack-ml-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976682" comment="glibc-langpack-mn-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976683" comment="glibc-langpack-mni-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976684" comment="glibc-langpack-mnw-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976685" comment="glibc-langpack-mr-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976686" comment="glibc-langpack-ms-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976687" comment="glibc-langpack-mt-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976688" comment="glibc-langpack-my-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976689" comment="glibc-langpack-nan-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976690" comment="glibc-langpack-nb-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976691" comment="glibc-langpack-nds-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976692" comment="glibc-langpack-ne-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976693" comment="glibc-langpack-nhn-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976694" comment="glibc-langpack-niu-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976695" comment="glibc-langpack-nl-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976696" comment="glibc-langpack-nn-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976697" comment="glibc-langpack-nr-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976698" comment="glibc-langpack-nso-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976699" comment="glibc-langpack-oc-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976700" comment="glibc-langpack-om-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976701" comment="glibc-langpack-or-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976702" comment="glibc-langpack-os-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976703" comment="glibc-langpack-pa-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976704" comment="glibc-langpack-pap-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976705" comment="glibc-langpack-pl-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976706" comment="glibc-langpack-ps-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976707" comment="glibc-langpack-pt-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976708" comment="glibc-langpack-quz-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976709" comment="glibc-langpack-raj-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976710" comment="glibc-langpack-ro-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976711" comment="glibc-langpack-ru-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976712" comment="glibc-langpack-rw-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976713" comment="glibc-langpack-sa-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976714" comment="glibc-langpack-sah-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976715" comment="glibc-langpack-sat-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976716" comment="glibc-langpack-sc-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976717" comment="glibc-langpack-sd-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976718" comment="glibc-langpack-se-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976719" comment="glibc-langpack-sgs-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976720" comment="glibc-langpack-shn-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976721" comment="glibc-langpack-shs-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976722" comment="glibc-langpack-si-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976723" comment="glibc-langpack-sid-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976724" comment="glibc-langpack-sk-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976725" comment="glibc-langpack-sl-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976726" comment="glibc-langpack-sm-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976727" comment="glibc-langpack-so-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976728" comment="glibc-langpack-sq-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976729" comment="glibc-langpack-sr-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976730" comment="glibc-langpack-ss-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976731" comment="glibc-langpack-st-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976732" comment="glibc-langpack-sv-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976733" comment="glibc-langpack-sw-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976734" comment="glibc-langpack-szl-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976735" comment="glibc-langpack-ta-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976736" comment="glibc-langpack-tcy-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976737" comment="glibc-langpack-te-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976738" comment="glibc-langpack-tg-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976739" comment="glibc-langpack-th-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976740" comment="glibc-langpack-the-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976741" comment="glibc-langpack-ti-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976742" comment="glibc-langpack-tig-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976743" comment="glibc-langpack-tk-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976744" comment="glibc-langpack-tl-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976745" comment="glibc-langpack-tn-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976746" comment="glibc-langpack-to-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976747" comment="glibc-langpack-tpi-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976748" comment="glibc-langpack-tr-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976749" comment="glibc-langpack-ts-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976750" comment="glibc-langpack-tt-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976751" comment="glibc-langpack-ug-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976752" comment="glibc-langpack-uk-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976753" comment="glibc-langpack-unm-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976754" comment="glibc-langpack-ur-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976755" comment="glibc-langpack-uz-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976756" comment="glibc-langpack-ve-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976757" comment="glibc-langpack-vi-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976758" comment="glibc-langpack-wa-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976759" comment="glibc-langpack-wae-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976760" comment="glibc-langpack-wal-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976761" comment="glibc-langpack-wo-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976762" comment="glibc-langpack-xh-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976763" comment="glibc-langpack-yi-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976764" comment="glibc-langpack-yo-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976765" comment="glibc-langpack-yue-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976766" comment="glibc-langpack-yuw-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976767" comment="glibc-langpack-zh-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976768" comment="glibc-langpack-zu-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976769" comment="glibc-locale-source-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976770" comment="glibc-minimal-langpack-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976771" comment="glibc-nss-devel-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976772" comment="glibc-static-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976773" comment="glibc-utils-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976774" comment="libnsl-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976775" comment="nscd-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976776" comment="nss_db-2.34-125.el9_5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976777" comment="nss_hesiod-2.34-125.el9_5.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4732" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-11233" ref_url="https://www.suse.com/security/cve/CVE-2024-11233/" source="CVE"/>
		<reference ref_id="CVE-2024-11234" ref_url="https://www.suse.com/security/cve/CVE-2024-11234/" source="CVE"/>
		<reference ref_id="CVE-2024-8929" ref_url="https://www.suse.com/security/cve/CVE-2024-8929/" source="CVE"/>
		<reference ref_id="CVE-2025-1217" ref_url="https://www.suse.com/security/cve/CVE-2025-1217/" source="CVE"/>
		<reference ref_id="CVE-2025-1219" ref_url="https://www.suse.com/security/cve/CVE-2025-1219/" source="CVE"/>
		<reference ref_id="CVE-2025-1734" ref_url="https://www.suse.com/security/cve/CVE-2025-1734/" source="CVE"/>
		<reference ref_id="CVE-2025-1736" ref_url="https://www.suse.com/security/cve/CVE-2025-1736/" source="CVE"/>
		<reference ref_id="CVE-2025-1861" ref_url="https://www.suse.com/security/cve/CVE-2025-1861/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4263.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4263.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11233/">CVE-2024-11233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11233">CVE-2024-11233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11234/">CVE-2024-11234 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11234">CVE-2024-11234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8929/">CVE-2024-8929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8929">CVE-2024-8929 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1217/">CVE-2025-1217 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1217">CVE-2025-1217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1219/">CVE-2025-1219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1219">CVE-2025-1219 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1734/">CVE-2025-1734 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1734">CVE-2025-1734 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1736/">CVE-2025-1736 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1736">CVE-2025-1736 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1861/">CVE-2025-1861 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1861">CVE-2025-1861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976778" comment="php-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976779" comment="php-bcmath-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976780" comment="php-cli-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976781" comment="php-common-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976782" comment="php-dba-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976783" comment="php-dbg-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976784" comment="php-devel-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976785" comment="php-embedded-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976786" comment="php-enchant-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976787" comment="php-ffi-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976788" comment="php-fpm-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976789" comment="php-gd-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976790" comment="php-gmp-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976791" comment="php-intl-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976792" comment="php-ldap-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976793" comment="php-mbstring-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976794" comment="php-mysqlnd-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976795" comment="php-odbc-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976796" comment="php-opcache-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976797" comment="php-pdo-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976798" comment="php-pgsql-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976799" comment="php-process-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976800" comment="php-snmp-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976801" comment="php-soap-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976802" comment="php-xml-8.1.32-1.module+el9.5.0+23047+aadb97d2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4733" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-42292" ref_url="https://www.suse.com/security/cve/CVE-2024-42292/" source="CVE"/>
		<reference ref_id="CVE-2024-42322" ref_url="https://www.suse.com/security/cve/CVE-2024-42322/" source="CVE"/>
		<reference ref_id="CVE-2024-44990" ref_url="https://www.suse.com/security/cve/CVE-2024-44990/" source="CVE"/>
		<reference ref_id="CVE-2024-46826" ref_url="https://www.suse.com/security/cve/CVE-2024-46826/" source="CVE"/>
		<reference ref_id="CVE-2025-21927" ref_url="https://www.suse.com/security/cve/CVE-2025-21927/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4341.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4341.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42292/">CVE-2024-42292 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42292">CVE-2024-42292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42322/">CVE-2024-42322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42322">CVE-2024-42322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44990/">CVE-2024-44990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44990">CVE-2024-44990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46826/">CVE-2024-46826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46826">CVE-2024-46826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21927/">CVE-2025-21927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21927">CVE-2025-21927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977299" comment="bpftool-7.4.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977300" comment="kernel-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977301" comment="kernel-abi-stablelists-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977302" comment="kernel-core-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977303" comment="kernel-cross-headers-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977304" comment="kernel-debug-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977305" comment="kernel-debug-core-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977308" comment="kernel-debug-modules-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977309" comment="kernel-debug-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977310" comment="kernel-debug-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977311" comment="kernel-debug-uki-virt-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977314" comment="kernel-doc-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977315" comment="kernel-headers-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977316" comment="kernel-modules-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977317" comment="kernel-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977318" comment="kernel-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977319" comment="kernel-rt-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977320" comment="kernel-rt-core-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977321" comment="kernel-rt-debug-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977322" comment="kernel-rt-debug-core-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977324" comment="kernel-rt-debug-kvm-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977325" comment="kernel-rt-debug-modules-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977326" comment="kernel-rt-debug-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977327" comment="kernel-rt-debug-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977329" comment="kernel-rt-kvm-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977330" comment="kernel-rt-modules-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977331" comment="kernel-rt-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977332" comment="kernel-rt-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977333" comment="kernel-tools-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977334" comment="kernel-tools-libs-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977336" comment="kernel-uki-virt-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977337" comment="kernel-uki-virt-addons-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977338" comment="libperf-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977339" comment="perf-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977340" comment="python3-perf-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977341" comment="rtla-5.14.0-503.40.1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977342" comment="rv-5.14.0-503.40.1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4734" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-2817" ref_url="https://www.suse.com/security/cve/CVE-2025-2817/" source="CVE"/>
		<reference ref_id="CVE-2025-4083" ref_url="https://www.suse.com/security/cve/CVE-2025-4083/" source="CVE"/>
		<reference ref_id="CVE-2025-4087" ref_url="https://www.suse.com/security/cve/CVE-2025-4087/" source="CVE"/>
		<reference ref_id="CVE-2025-4091" ref_url="https://www.suse.com/security/cve/CVE-2025-4091/" source="CVE"/>
		<reference ref_id="CVE-2025-4093" ref_url="https://www.suse.com/security/cve/CVE-2025-4093/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4443.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4443.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2817/">CVE-2025-2817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2817">CVE-2025-2817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4083/">CVE-2025-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4083">CVE-2025-4083 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4087/">CVE-2025-4087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4087">CVE-2025-4087 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4091/">CVE-2025-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4091">CVE-2025-4091 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4093/">CVE-2025-4093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4093">CVE-2025-4093 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977554" comment="firefox-128.10.0-1.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977555" comment="firefox-x11-128.10.0-1.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4735" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-2817" ref_url="https://www.suse.com/security/cve/CVE-2025-2817/" source="CVE"/>
		<reference ref_id="CVE-2025-4083" ref_url="https://www.suse.com/security/cve/CVE-2025-4083/" source="CVE"/>
		<reference ref_id="CVE-2025-4087" ref_url="https://www.suse.com/security/cve/CVE-2025-4087/" source="CVE"/>
		<reference ref_id="CVE-2025-4091" ref_url="https://www.suse.com/security/cve/CVE-2025-4091/" source="CVE"/>
		<reference ref_id="CVE-2025-4093" ref_url="https://www.suse.com/security/cve/CVE-2025-4093/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4460.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4460.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2817/">CVE-2025-2817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2817">CVE-2025-2817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4083/">CVE-2025-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4083">CVE-2025-4083 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4087/">CVE-2025-4087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4087">CVE-2025-4087 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4091/">CVE-2025-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4091">CVE-2025-4091 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4093/">CVE-2025-4093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4093">CVE-2025-4093 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977556" comment="thunderbird-128.10.0-1.el9_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4736" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-27219" ref_url="https://www.suse.com/security/cve/CVE-2025-27219/" source="CVE"/>
		<reference ref_id="CVE-2025-27220" ref_url="https://www.suse.com/security/cve/CVE-2025-27220/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4487.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4487.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27219/">CVE-2025-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27219">CVE-2025-27219 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27220/">CVE-2025-27220 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27220">CVE-2025-27220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981850" comment="ruby-3.0.7-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981851" comment="ruby-default-gems-3.0.7-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981852" comment="ruby-devel-3.0.7-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981853" comment="ruby-doc-3.0.7-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981854" comment="ruby-libs-3.0.7-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981855" comment="rubygem-bigdecimal-3.0.0-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981856" comment="rubygem-bundler-2.2.33-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981857" comment="rubygem-io-console-0.5.7-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981858" comment="rubygem-irb-1.3.5-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981859" comment="rubygem-json-2.5.1-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981860" comment="rubygem-minitest-5.14.2-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981861" comment="rubygem-power_assert-1.2.1-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981862" comment="rubygem-psych-3.3.2-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981863" comment="rubygem-rake-13.0.3-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981864" comment="rubygem-rbs-1.4.0-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981865" comment="rubygem-rdoc-6.3.4.1-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981866" comment="rubygem-rexml-3.2.5-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981867" comment="rubygem-rss-0.2.9-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981868" comment="rubygem-test-unit-3.3.7-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981869" comment="rubygem-typeprof-0.15.2-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981870" comment="rubygems-3.2.33-165.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981871" comment="rubygems-devel-3.2.33-165.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4737" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-39908" ref_url="https://www.suse.com/security/cve/CVE-2024-39908/" source="CVE"/>
		<reference ref_id="CVE-2024-41123" ref_url="https://www.suse.com/security/cve/CVE-2024-41123/" source="CVE"/>
		<reference ref_id="CVE-2024-41946" ref_url="https://www.suse.com/security/cve/CVE-2024-41946/" source="CVE"/>
		<reference ref_id="CVE-2024-43398" ref_url="https://www.suse.com/security/cve/CVE-2024-43398/" source="CVE"/>
		<reference ref_id="CVE-2025-27219" ref_url="https://www.suse.com/security/cve/CVE-2025-27219/" source="CVE"/>
		<reference ref_id="CVE-2025-27220" ref_url="https://www.suse.com/security/cve/CVE-2025-27220/" source="CVE"/>
		<reference ref_id="CVE-2025-27221" ref_url="https://www.suse.com/security/cve/CVE-2025-27221/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4488.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4488.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39908/">CVE-2024-39908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39908">CVE-2024-39908 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41123/">CVE-2024-41123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41123">CVE-2024-41123 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41946/">CVE-2024-41946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41946">CVE-2024-41946 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43398/">CVE-2024-43398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43398">CVE-2024-43398 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27219/">CVE-2025-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27219">CVE-2025-27219 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27220/">CVE-2025-27220 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27220">CVE-2025-27220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27221/">CVE-2025-27221 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27221">CVE-2025-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977557" comment="ruby-3.1.7-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977558" comment="ruby-bundled-gems-3.1.7-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977559" comment="ruby-default-gems-3.1.7-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977560" comment="ruby-devel-3.1.7-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977561" comment="ruby-doc-3.1.7-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977562" comment="ruby-libs-3.1.7-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977563" comment="rubygem-bigdecimal-3.1.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977564" comment="rubygem-bundler-2.3.27-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977565" comment="rubygem-io-console-0.5.11-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977566" comment="rubygem-irb-1.4.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977567" comment="rubygem-json-2.6.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977568" comment="rubygem-minitest-5.15.0-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872260" comment="rubygem-mysql2-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872261" comment="rubygem-mysql2-doc-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872262" comment="rubygem-pg-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872263" comment="rubygem-pg-doc-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977569" comment="rubygem-power_assert-2.0.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977570" comment="rubygem-psych-4.0.4-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977571" comment="rubygem-rake-13.0.6-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977572" comment="rubygem-rbs-2.7.0-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977573" comment="rubygem-rdoc-6.4.1.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977574" comment="rubygem-rexml-3.3.9-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977575" comment="rubygem-rss-0.3.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977576" comment="rubygem-test-unit-3.5.3-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977577" comment="rubygem-typeprof-0.21.3-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977578" comment="rubygems-3.3.27-146.module+el9.5.0+23003+a4c328ce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977579" comment="rubygems-devel-3.3.27-146.module+el9.5.0+23003+a4c328ce is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4738" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-2487" ref_url="https://www.suse.com/security/cve/CVE-2025-2487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4491.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4491.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2487/">CVE-2025-2487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2487">CVE-2025-2487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977580" comment="389-ds-base-2.5.2-9.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977581" comment="389-ds-base-devel-2.5.2-9.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977582" comment="389-ds-base-libs-2.5.2-9.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977583" comment="389-ds-base-snmp-2.5.2-9.el9_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977584" comment="python3-lib389-2.5.2-9.el9_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4739" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-6693" ref_url="https://www.suse.com/security/cve/CVE-2023-6693/" source="CVE"/>
		<reference ref_id="CVE-2024-3567" ref_url="https://www.suse.com/security/cve/CVE-2024-3567/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4492.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4492.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6693/">CVE-2023-6693 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6693">CVE-2023-6693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3567/">CVE-2024-3567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3567">CVE-2024-3567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981936" comment="qemu-guest-agent-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981937" comment="qemu-img-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981938" comment="qemu-kvm-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981939" comment="qemu-kvm-audio-pa-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981940" comment="qemu-kvm-block-blkio-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981941" comment="qemu-kvm-block-curl-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981942" comment="qemu-kvm-block-rbd-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981943" comment="qemu-kvm-common-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981944" comment="qemu-kvm-core-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981945" comment="qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981946" comment="qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981947" comment="qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981948" comment="qemu-kvm-device-usb-host-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981949" comment="qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981950" comment="qemu-kvm-docs-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981951" comment="qemu-kvm-tools-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981952" comment="qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981953" comment="qemu-kvm-ui-opengl-9.0.0-10.el9_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981954" comment="qemu-pr-helper-9.0.0-10.el9_5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4740" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-25186" ref_url="https://www.suse.com/security/cve/CVE-2025-25186/" source="CVE"/>
		<reference ref_id="CVE-2025-27219" ref_url="https://www.suse.com/security/cve/CVE-2025-27219/" source="CVE"/>
		<reference ref_id="CVE-2025-27221" ref_url="https://www.suse.com/security/cve/CVE-2025-27221/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4493.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4493.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25186/">CVE-2025-25186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25186">CVE-2025-25186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27219/">CVE-2025-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27219">CVE-2025-27219 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27221/">CVE-2025-27221 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27221">CVE-2025-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985952" comment="ruby-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985953" comment="ruby-bundled-gems-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985954" comment="ruby-default-gems-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985955" comment="ruby-devel-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985956" comment="ruby-doc-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985957" comment="ruby-libs-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985958" comment="rubygem-bigdecimal-3.1.5-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985959" comment="rubygem-bundler-2.5.22-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985960" comment="rubygem-io-console-0.7.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985961" comment="rubygem-irb-1.13.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985962" comment="rubygem-json-2.7.2-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985963" comment="rubygem-minitest-5.20.0-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874724" comment="rubygem-mysql2-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874725" comment="rubygem-mysql2-doc-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985964" comment="rubygem-power_assert-2.0.3-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985965" comment="rubygem-psych-5.1.2-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985966" comment="rubygem-racc-1.7.3-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985967" comment="rubygem-rake-13.1.0-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985968" comment="rubygem-rbs-3.4.0-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985969" comment="rubygem-rdoc-6.6.3.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985970" comment="rubygem-rexml-3.3.9-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985971" comment="rubygem-rss-0.3.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985972" comment="rubygem-test-unit-3.6.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985973" comment="rubygem-typeprof-0.21.9-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985974" comment="rubygems-3.5.22-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985975" comment="rubygems-devel-3.5.22-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4741" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-53920" ref_url="https://www.suse.com/security/cve/CVE-2024-53920/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4787.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4787.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53920/">CVE-2024-53920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53920">CVE-2024-53920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981955" comment="emacs-27.2-11.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981956" comment="emacs-common-27.2-11.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981957" comment="emacs-filesystem-27.2-11.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981958" comment="emacs-lucid-27.2-11.el9_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981959" comment="emacs-nox-27.2-11.el9_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4742" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-48969" ref_url="https://www.suse.com/security/cve/CVE-2022-48969/" source="CVE"/>
		<reference ref_id="CVE-2022-48989" ref_url="https://www.suse.com/security/cve/CVE-2022-48989/" source="CVE"/>
		<reference ref_id="CVE-2022-49006" ref_url="https://www.suse.com/security/cve/CVE-2022-49006/" source="CVE"/>
		<reference ref_id="CVE-2022-49014" ref_url="https://www.suse.com/security/cve/CVE-2022-49014/" source="CVE"/>
		<reference ref_id="CVE-2022-49029" ref_url="https://www.suse.com/security/cve/CVE-2022-49029/" source="CVE"/>
		<reference ref_id="CVE-2022-49747" ref_url="https://www.suse.com/security/cve/CVE-2022-49747/" source="CVE"/>
		<reference ref_id="CVE-2022-49778" ref_url="https://www.suse.com/security/cve/CVE-2022-49778/" source="CVE"/>
		<reference ref_id="CVE-2022-49804" ref_url="https://www.suse.com/security/cve/CVE-2022-49804/" source="CVE"/>
		<reference ref_id="CVE-2022-49815" ref_url="https://www.suse.com/security/cve/CVE-2022-49815/" source="CVE"/>
		<reference ref_id="CVE-2022-50112" ref_url="https://www.suse.com/security/cve/CVE-2022-50112/" source="CVE"/>
		<reference ref_id="CVE-2022-50121" ref_url="https://www.suse.com/security/cve/CVE-2022-50121/" source="CVE"/>
		<reference ref_id="CVE-2022-50159" ref_url="https://www.suse.com/security/cve/CVE-2022-50159/" source="CVE"/>
		<reference ref_id="CVE-2022-50214" ref_url="https://www.suse.com/security/cve/CVE-2022-50214/" source="CVE"/>
		<reference ref_id="CVE-2022-50319" ref_url="https://www.suse.com/security/cve/CVE-2022-50319/" source="CVE"/>
		<reference ref_id="CVE-2022-50421" ref_url="https://www.suse.com/security/cve/CVE-2022-50421/" source="CVE"/>
		<reference ref_id="CVE-2022-50491" ref_url="https://www.suse.com/security/cve/CVE-2022-50491/" source="CVE"/>
		<reference ref_id="CVE-2022-50511" ref_url="https://www.suse.com/security/cve/CVE-2022-50511/" source="CVE"/>
		<reference ref_id="CVE-2022-50614" ref_url="https://www.suse.com/security/cve/CVE-2022-50614/" source="CVE"/>
		<reference ref_id="CVE-2022-50743" ref_url="https://www.suse.com/security/cve/CVE-2022-50743/" source="CVE"/>
		<reference ref_id="CVE-2022-50811" ref_url="https://www.suse.com/security/cve/CVE-2022-50811/" source="CVE"/>
		<reference ref_id="CVE-2023-52672" ref_url="https://www.suse.com/security/cve/CVE-2023-52672/" source="CVE"/>
		<reference ref_id="CVE-2023-52917" ref_url="https://www.suse.com/security/cve/CVE-2023-52917/" source="CVE"/>
		<reference ref_id="CVE-2023-53066" ref_url="https://www.suse.com/security/cve/CVE-2023-53066/" source="CVE"/>
		<reference ref_id="CVE-2023-53117" ref_url="https://www.suse.com/security/cve/CVE-2023-53117/" source="CVE"/>
		<reference ref_id="CVE-2023-53196" ref_url="https://www.suse.com/security/cve/CVE-2023-53196/" source="CVE"/>
		<reference ref_id="CVE-2023-53260" ref_url="https://www.suse.com/security/cve/CVE-2023-53260/" source="CVE"/>
		<reference ref_id="CVE-2023-53261" ref_url="https://www.suse.com/security/cve/CVE-2023-53261/" source="CVE"/>
		<reference ref_id="CVE-2023-53287" ref_url="https://www.suse.com/security/cve/CVE-2023-53287/" source="CVE"/>
		<reference ref_id="CVE-2023-53510" ref_url="https://www.suse.com/security/cve/CVE-2023-53510/" source="CVE"/>
		<reference ref_id="CVE-2023-53519" ref_url="https://www.suse.com/security/cve/CVE-2023-53519/" source="CVE"/>
		<reference ref_id="CVE-2023-53555" ref_url="https://www.suse.com/security/cve/CVE-2023-53555/" source="CVE"/>
		<reference ref_id="CVE-2023-53568" ref_url="https://www.suse.com/security/cve/CVE-2023-53568/" source="CVE"/>
		<reference ref_id="CVE-2023-53595" ref_url="https://www.suse.com/security/cve/CVE-2023-53595/" source="CVE"/>
		<reference ref_id="CVE-2023-53654" ref_url="https://www.suse.com/security/cve/CVE-2023-53654/" source="CVE"/>
		<reference ref_id="CVE-2023-53859" ref_url="https://www.suse.com/security/cve/CVE-2023-53859/" source="CVE"/>
		<reference ref_id="CVE-2023-53989" ref_url="https://www.suse.com/security/cve/CVE-2023-53989/" source="CVE"/>
		<reference ref_id="CVE-2023-54089" ref_url="https://www.suse.com/security/cve/CVE-2023-54089/" source="CVE"/>
		<reference ref_id="CVE-2023-54117" ref_url="https://www.suse.com/security/cve/CVE-2023-54117/" source="CVE"/>
		<reference ref_id="CVE-2023-54230" ref_url="https://www.suse.com/security/cve/CVE-2023-54230/" source="CVE"/>
		<reference ref_id="CVE-2023-54278" ref_url="https://www.suse.com/security/cve/CVE-2023-54278/" source="CVE"/>
		<reference ref_id="CVE-2023-54313" ref_url="https://www.suse.com/security/cve/CVE-2023-54313/" source="CVE"/>
		<reference ref_id="CVE-2023-54322" ref_url="https://www.suse.com/security/cve/CVE-2023-54322/" source="CVE"/>
		<reference ref_id="CVE-2024-27008" ref_url="https://www.suse.com/security/cve/CVE-2024-27008/" source="CVE"/>
		<reference ref_id="CVE-2024-27398" ref_url="https://www.suse.com/security/cve/CVE-2024-27398/" source="CVE"/>
		<reference ref_id="CVE-2024-35891" ref_url="https://www.suse.com/security/cve/CVE-2024-35891/" source="CVE"/>
		<reference ref_id="CVE-2024-35933" ref_url="https://www.suse.com/security/cve/CVE-2024-35933/" source="CVE"/>
		<reference ref_id="CVE-2024-35934" ref_url="https://www.suse.com/security/cve/CVE-2024-35934/" source="CVE"/>
		<reference ref_id="CVE-2024-35963" ref_url="https://www.suse.com/security/cve/CVE-2024-35963/" source="CVE"/>
		<reference ref_id="CVE-2024-35964" ref_url="https://www.suse.com/security/cve/CVE-2024-35964/" source="CVE"/>
		<reference ref_id="CVE-2024-35965" ref_url="https://www.suse.com/security/cve/CVE-2024-35965/" source="CVE"/>
		<reference ref_id="CVE-2024-35966" ref_url="https://www.suse.com/security/cve/CVE-2024-35966/" source="CVE"/>
		<reference ref_id="CVE-2024-35967" ref_url="https://www.suse.com/security/cve/CVE-2024-35967/" source="CVE"/>
		<reference ref_id="CVE-2024-35978" ref_url="https://www.suse.com/security/cve/CVE-2024-35978/" source="CVE"/>
		<reference ref_id="CVE-2024-36011" ref_url="https://www.suse.com/security/cve/CVE-2024-36011/" source="CVE"/>
		<reference ref_id="CVE-2024-36012" ref_url="https://www.suse.com/security/cve/CVE-2024-36012/" source="CVE"/>
		<reference ref_id="CVE-2024-36013" ref_url="https://www.suse.com/security/cve/CVE-2024-36013/" source="CVE"/>
		<reference ref_id="CVE-2024-36880" ref_url="https://www.suse.com/security/cve/CVE-2024-36880/" source="CVE"/>
		<reference ref_id="CVE-2024-36968" ref_url="https://www.suse.com/security/cve/CVE-2024-36968/" source="CVE"/>
		<reference ref_id="CVE-2024-38541" ref_url="https://www.suse.com/security/cve/CVE-2024-38541/" source="CVE"/>
		<reference ref_id="CVE-2024-39500" ref_url="https://www.suse.com/security/cve/CVE-2024-39500/" source="CVE"/>
		<reference ref_id="CVE-2024-40956" ref_url="https://www.suse.com/security/cve/CVE-2024-40956/" source="CVE"/>
		<reference ref_id="CVE-2024-41010" ref_url="https://www.suse.com/security/cve/CVE-2024-41010/" source="CVE"/>
		<reference ref_id="CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062/" source="CVE"/>
		<reference ref_id="CVE-2024-42094" ref_url="https://www.suse.com/security/cve/CVE-2024-42094/" source="CVE"/>
		<reference ref_id="CVE-2024-42133" ref_url="https://www.suse.com/security/cve/CVE-2024-42133/" source="CVE"/>
		<reference ref_id="CVE-2024-42253" ref_url="https://www.suse.com/security/cve/CVE-2024-42253/" source="CVE"/>
		<reference ref_id="CVE-2024-42265" ref_url="https://www.suse.com/security/cve/CVE-2024-42265/" source="CVE"/>
		<reference ref_id="CVE-2024-42278" ref_url="https://www.suse.com/security/cve/CVE-2024-42278/" source="CVE"/>
		<reference ref_id="CVE-2024-42291" ref_url="https://www.suse.com/security/cve/CVE-2024-42291/" source="CVE"/>
		<reference ref_id="CVE-2024-42294" ref_url="https://www.suse.com/security/cve/CVE-2024-42294/" source="CVE"/>
		<reference ref_id="CVE-2024-42302" ref_url="https://www.suse.com/security/cve/CVE-2024-42302/" source="CVE"/>
		<reference ref_id="CVE-2024-42304" ref_url="https://www.suse.com/security/cve/CVE-2024-42304/" source="CVE"/>
		<reference ref_id="CVE-2024-42305" ref_url="https://www.suse.com/security/cve/CVE-2024-42305/" source="CVE"/>
		<reference ref_id="CVE-2024-42312" ref_url="https://www.suse.com/security/cve/CVE-2024-42312/" source="CVE"/>
		<reference ref_id="CVE-2024-42315" ref_url="https://www.suse.com/security/cve/CVE-2024-42315/" source="CVE"/>
		<reference ref_id="CVE-2024-42316" ref_url="https://www.suse.com/security/cve/CVE-2024-42316/" source="CVE"/>
		<reference ref_id="CVE-2024-42321" ref_url="https://www.suse.com/security/cve/CVE-2024-42321/" source="CVE"/>
		<reference ref_id="CVE-2024-43820" ref_url="https://www.suse.com/security/cve/CVE-2024-43820/" source="CVE"/>
		<reference ref_id="CVE-2024-43821" ref_url="https://www.suse.com/security/cve/CVE-2024-43821/" source="CVE"/>
		<reference ref_id="CVE-2024-43823" ref_url="https://www.suse.com/security/cve/CVE-2024-43823/" source="CVE"/>
		<reference ref_id="CVE-2024-43828" ref_url="https://www.suse.com/security/cve/CVE-2024-43828/" source="CVE"/>
		<reference ref_id="CVE-2024-43834" ref_url="https://www.suse.com/security/cve/CVE-2024-43834/" source="CVE"/>
		<reference ref_id="CVE-2024-43846" ref_url="https://www.suse.com/security/cve/CVE-2024-43846/" source="CVE"/>
		<reference ref_id="CVE-2024-43853" ref_url="https://www.suse.com/security/cve/CVE-2024-43853/" source="CVE"/>
		<reference ref_id="CVE-2024-43871" ref_url="https://www.suse.com/security/cve/CVE-2024-43871/" source="CVE"/>
		<reference ref_id="CVE-2024-43873" ref_url="https://www.suse.com/security/cve/CVE-2024-43873/" source="CVE"/>
		<reference ref_id="CVE-2024-43882" ref_url="https://www.suse.com/security/cve/CVE-2024-43882/" source="CVE"/>
		<reference ref_id="CVE-2024-43884" ref_url="https://www.suse.com/security/cve/CVE-2024-43884/" source="CVE"/>
		<reference ref_id="CVE-2024-43889" ref_url="https://www.suse.com/security/cve/CVE-2024-43889/" source="CVE"/>
		<reference ref_id="CVE-2024-43898" ref_url="https://www.suse.com/security/cve/CVE-2024-43898/" source="CVE"/>
		<reference ref_id="CVE-2024-43910" ref_url="https://www.suse.com/security/cve/CVE-2024-43910/" source="CVE"/>
		<reference ref_id="CVE-2024-43914" ref_url="https://www.suse.com/security/cve/CVE-2024-43914/" source="CVE"/>
		<reference ref_id="CVE-2024-44931" ref_url="https://www.suse.com/security/cve/CVE-2024-44931/" source="CVE"/>
		<reference ref_id="CVE-2024-44932" ref_url="https://www.suse.com/security/cve/CVE-2024-44932/" source="CVE"/>
		<reference ref_id="CVE-2024-44934" ref_url="https://www.suse.com/security/cve/CVE-2024-44934/" source="CVE"/>
		<reference ref_id="CVE-2024-44952" ref_url="https://www.suse.com/security/cve/CVE-2024-44952/" source="CVE"/>
		<reference ref_id="CVE-2024-44958" ref_url="https://www.suse.com/security/cve/CVE-2024-44958/" source="CVE"/>
		<reference ref_id="CVE-2024-44964" ref_url="https://www.suse.com/security/cve/CVE-2024-44964/" source="CVE"/>
		<reference ref_id="CVE-2024-44975" ref_url="https://www.suse.com/security/cve/CVE-2024-44975/" source="CVE"/>
		<reference ref_id="CVE-2024-44987" ref_url="https://www.suse.com/security/cve/CVE-2024-44987/" source="CVE"/>
		<reference ref_id="CVE-2024-44989" ref_url="https://www.suse.com/security/cve/CVE-2024-44989/" source="CVE"/>
		<reference ref_id="CVE-2024-45000" ref_url="https://www.suse.com/security/cve/CVE-2024-45000/" source="CVE"/>
		<reference ref_id="CVE-2024-45009" ref_url="https://www.suse.com/security/cve/CVE-2024-45009/" source="CVE"/>
		<reference ref_id="CVE-2024-45010" ref_url="https://www.suse.com/security/cve/CVE-2024-45010/" source="CVE"/>
		<reference ref_id="CVE-2024-45016" ref_url="https://www.suse.com/security/cve/CVE-2024-45016/" source="CVE"/>
		<reference ref_id="CVE-2024-45022" ref_url="https://www.suse.com/security/cve/CVE-2024-45022/" source="CVE"/>
		<reference ref_id="CVE-2024-46673" ref_url="https://www.suse.com/security/cve/CVE-2024-46673/" source="CVE"/>
		<reference ref_id="CVE-2024-46675" ref_url="https://www.suse.com/security/cve/CVE-2024-46675/" source="CVE"/>
		<reference ref_id="CVE-2024-46711" ref_url="https://www.suse.com/security/cve/CVE-2024-46711/" source="CVE"/>
		<reference ref_id="CVE-2024-46722" ref_url="https://www.suse.com/security/cve/CVE-2024-46722/" source="CVE"/>
		<reference ref_id="CVE-2024-46723" ref_url="https://www.suse.com/security/cve/CVE-2024-46723/" source="CVE"/>
		<reference ref_id="CVE-2024-46724" ref_url="https://www.suse.com/security/cve/CVE-2024-46724/" source="CVE"/>
		<reference ref_id="CVE-2024-46725" ref_url="https://www.suse.com/security/cve/CVE-2024-46725/" source="CVE"/>
		<reference ref_id="CVE-2024-46743" ref_url="https://www.suse.com/security/cve/CVE-2024-46743/" source="CVE"/>
		<reference ref_id="CVE-2024-46745" ref_url="https://www.suse.com/security/cve/CVE-2024-46745/" source="CVE"/>
		<reference ref_id="CVE-2024-46747" ref_url="https://www.suse.com/security/cve/CVE-2024-46747/" source="CVE"/>
		<reference ref_id="CVE-2024-46750" ref_url="https://www.suse.com/security/cve/CVE-2024-46750/" source="CVE"/>
		<reference ref_id="CVE-2024-46754" ref_url="https://www.suse.com/security/cve/CVE-2024-46754/" source="CVE"/>
		<reference ref_id="CVE-2024-46756" ref_url="https://www.suse.com/security/cve/CVE-2024-46756/" source="CVE"/>
		<reference ref_id="CVE-2024-46758" ref_url="https://www.suse.com/security/cve/CVE-2024-46758/" source="CVE"/>
		<reference ref_id="CVE-2024-46759" ref_url="https://www.suse.com/security/cve/CVE-2024-46759/" source="CVE"/>
		<reference ref_id="CVE-2024-46761" ref_url="https://www.suse.com/security/cve/CVE-2024-46761/" source="CVE"/>
		<reference ref_id="CVE-2024-46783" ref_url="https://www.suse.com/security/cve/CVE-2024-46783/" source="CVE"/>
		<reference ref_id="CVE-2024-46786" ref_url="https://www.suse.com/security/cve/CVE-2024-46786/" source="CVE"/>
		<reference ref_id="CVE-2024-46787" ref_url="https://www.suse.com/security/cve/CVE-2024-46787/" source="CVE"/>
		<reference ref_id="CVE-2024-46800" ref_url="https://www.suse.com/security/cve/CVE-2024-46800/" source="CVE"/>
		<reference ref_id="CVE-2024-46805" ref_url="https://www.suse.com/security/cve/CVE-2024-46805/" source="CVE"/>
		<reference ref_id="CVE-2024-46806" ref_url="https://www.suse.com/security/cve/CVE-2024-46806/" source="CVE"/>
		<reference ref_id="CVE-2024-46807" ref_url="https://www.suse.com/security/cve/CVE-2024-46807/" source="CVE"/>
		<reference ref_id="CVE-2024-46819" ref_url="https://www.suse.com/security/cve/CVE-2024-46819/" source="CVE"/>
		<reference ref_id="CVE-2024-46820" ref_url="https://www.suse.com/security/cve/CVE-2024-46820/" source="CVE"/>
		<reference ref_id="CVE-2024-46822" ref_url="https://www.suse.com/security/cve/CVE-2024-46822/" source="CVE"/>
		<reference ref_id="CVE-2024-46828" ref_url="https://www.suse.com/security/cve/CVE-2024-46828/" source="CVE"/>
		<reference ref_id="CVE-2024-46835" ref_url="https://www.suse.com/security/cve/CVE-2024-46835/" source="CVE"/>
		<reference ref_id="CVE-2024-46839" ref_url="https://www.suse.com/security/cve/CVE-2024-46839/" source="CVE"/>
		<reference ref_id="CVE-2024-46853" ref_url="https://www.suse.com/security/cve/CVE-2024-46853/" source="CVE"/>
		<reference ref_id="CVE-2024-46864" ref_url="https://www.suse.com/security/cve/CVE-2024-46864/" source="CVE"/>
		<reference ref_id="CVE-2024-46871" ref_url="https://www.suse.com/security/cve/CVE-2024-46871/" source="CVE"/>
		<reference ref_id="CVE-2024-47141" ref_url="https://www.suse.com/security/cve/CVE-2024-47141/" source="CVE"/>
		<reference ref_id="CVE-2024-47660" ref_url="https://www.suse.com/security/cve/CVE-2024-47660/" source="CVE"/>
		<reference ref_id="CVE-2024-47668" ref_url="https://www.suse.com/security/cve/CVE-2024-47668/" source="CVE"/>
		<reference ref_id="CVE-2024-47678" ref_url="https://www.suse.com/security/cve/CVE-2024-47678/" source="CVE"/>
		<reference ref_id="CVE-2024-47685" ref_url="https://www.suse.com/security/cve/CVE-2024-47685/" source="CVE"/>
		<reference ref_id="CVE-2024-47687" ref_url="https://www.suse.com/security/cve/CVE-2024-47687/" source="CVE"/>
		<reference ref_id="CVE-2024-47692" ref_url="https://www.suse.com/security/cve/CVE-2024-47692/" source="CVE"/>
		<reference ref_id="CVE-2024-47700" ref_url="https://www.suse.com/security/cve/CVE-2024-47700/" source="CVE"/>
		<reference ref_id="CVE-2024-47703" ref_url="https://www.suse.com/security/cve/CVE-2024-47703/" source="CVE"/>
		<reference ref_id="CVE-2024-47705" ref_url="https://www.suse.com/security/cve/CVE-2024-47705/" source="CVE"/>
		<reference ref_id="CVE-2024-47706" ref_url="https://www.suse.com/security/cve/CVE-2024-47706/" source="CVE"/>
		<reference ref_id="CVE-2024-47710" ref_url="https://www.suse.com/security/cve/CVE-2024-47710/" source="CVE"/>
		<reference ref_id="CVE-2024-47713" ref_url="https://www.suse.com/security/cve/CVE-2024-47713/" source="CVE"/>
		<reference ref_id="CVE-2024-47715" ref_url="https://www.suse.com/security/cve/CVE-2024-47715/" source="CVE"/>
		<reference ref_id="CVE-2024-47718" ref_url="https://www.suse.com/security/cve/CVE-2024-47718/" source="CVE"/>
		<reference ref_id="CVE-2024-47719" ref_url="https://www.suse.com/security/cve/CVE-2024-47719/" source="CVE"/>
		<reference ref_id="CVE-2024-47737" ref_url="https://www.suse.com/security/cve/CVE-2024-47737/" source="CVE"/>
		<reference ref_id="CVE-2024-47738" ref_url="https://www.suse.com/security/cve/CVE-2024-47738/" source="CVE"/>
		<reference ref_id="CVE-2024-47739" ref_url="https://www.suse.com/security/cve/CVE-2024-47739/" source="CVE"/>
		<reference ref_id="CVE-2024-47745" ref_url="https://www.suse.com/security/cve/CVE-2024-47745/" source="CVE"/>
		<reference ref_id="CVE-2024-47748" ref_url="https://www.suse.com/security/cve/CVE-2024-47748/" source="CVE"/>
		<reference ref_id="CVE-2024-48873" ref_url="https://www.suse.com/security/cve/CVE-2024-48873/" source="CVE"/>
		<reference ref_id="CVE-2024-49569" ref_url="https://www.suse.com/security/cve/CVE-2024-49569/" source="CVE"/>
		<reference ref_id="CVE-2024-49851" ref_url="https://www.suse.com/security/cve/CVE-2024-49851/" source="CVE"/>
		<reference ref_id="CVE-2024-49856" ref_url="https://www.suse.com/security/cve/CVE-2024-49856/" source="CVE"/>
		<reference ref_id="CVE-2024-49860" ref_url="https://www.suse.com/security/cve/CVE-2024-49860/" source="CVE"/>
		<reference ref_id="CVE-2024-49861" ref_url="https://www.suse.com/security/cve/CVE-2024-49861/" source="CVE"/>
		<reference ref_id="CVE-2024-49862" ref_url="https://www.suse.com/security/cve/CVE-2024-49862/" source="CVE"/>
		<reference ref_id="CVE-2024-49870" ref_url="https://www.suse.com/security/cve/CVE-2024-49870/" source="CVE"/>
		<reference ref_id="CVE-2024-49875" ref_url="https://www.suse.com/security/cve/CVE-2024-49875/" source="CVE"/>
		<reference ref_id="CVE-2024-49878" ref_url="https://www.suse.com/security/cve/CVE-2024-49878/" source="CVE"/>
		<reference ref_id="CVE-2024-49881" ref_url="https://www.suse.com/security/cve/CVE-2024-49881/" source="CVE"/>
		<reference ref_id="CVE-2024-49882" ref_url="https://www.suse.com/security/cve/CVE-2024-49882/" source="CVE"/>
		<reference ref_id="CVE-2024-49883" ref_url="https://www.suse.com/security/cve/CVE-2024-49883/" source="CVE"/>
		<reference ref_id="CVE-2024-49884" ref_url="https://www.suse.com/security/cve/CVE-2024-49884/" source="CVE"/>
		<reference ref_id="CVE-2024-49885" ref_url="https://www.suse.com/security/cve/CVE-2024-49885/" source="CVE"/>
		<reference ref_id="CVE-2024-49886" ref_url="https://www.suse.com/security/cve/CVE-2024-49886/" source="CVE"/>
		<reference ref_id="CVE-2024-49889" ref_url="https://www.suse.com/security/cve/CVE-2024-49889/" source="CVE"/>
		<reference ref_id="CVE-2024-49904" ref_url="https://www.suse.com/security/cve/CVE-2024-49904/" source="CVE"/>
		<reference ref_id="CVE-2024-49927" ref_url="https://www.suse.com/security/cve/CVE-2024-49927/" source="CVE"/>
		<reference ref_id="CVE-2024-49928" ref_url="https://www.suse.com/security/cve/CVE-2024-49928/" source="CVE"/>
		<reference ref_id="CVE-2024-49929" ref_url="https://www.suse.com/security/cve/CVE-2024-49929/" source="CVE"/>
		<reference ref_id="CVE-2024-49930" ref_url="https://www.suse.com/security/cve/CVE-2024-49930/" source="CVE"/>
		<reference ref_id="CVE-2024-49933" ref_url="https://www.suse.com/security/cve/CVE-2024-49933/" source="CVE"/>
		<reference ref_id="CVE-2024-49934" ref_url="https://www.suse.com/security/cve/CVE-2024-49934/" source="CVE"/>
		<reference ref_id="CVE-2024-49935" ref_url="https://www.suse.com/security/cve/CVE-2024-49935/" source="CVE"/>
		<reference ref_id="CVE-2024-49937" ref_url="https://www.suse.com/security/cve/CVE-2024-49937/" source="CVE"/>
		<reference ref_id="CVE-2024-49938" ref_url="https://www.suse.com/security/cve/CVE-2024-49938/" source="CVE"/>
		<reference ref_id="CVE-2024-49939" ref_url="https://www.suse.com/security/cve/CVE-2024-49939/" source="CVE"/>
		<reference ref_id="CVE-2024-49946" ref_url="https://www.suse.com/security/cve/CVE-2024-49946/" source="CVE"/>
		<reference ref_id="CVE-2024-49948" ref_url="https://www.suse.com/security/cve/CVE-2024-49948/" source="CVE"/>
		<reference ref_id="CVE-2024-49950" ref_url="https://www.suse.com/security/cve/CVE-2024-49950/" source="CVE"/>
		<reference ref_id="CVE-2024-49951" ref_url="https://www.suse.com/security/cve/CVE-2024-49951/" source="CVE"/>
		<reference ref_id="CVE-2024-49954" ref_url="https://www.suse.com/security/cve/CVE-2024-49954/" source="CVE"/>
		<reference ref_id="CVE-2024-49959" ref_url="https://www.suse.com/security/cve/CVE-2024-49959/" source="CVE"/>
		<reference ref_id="CVE-2024-49960" ref_url="https://www.suse.com/security/cve/CVE-2024-49960/" source="CVE"/>
		<reference ref_id="CVE-2024-49962" ref_url="https://www.suse.com/security/cve/CVE-2024-49962/" source="CVE"/>
		<reference ref_id="CVE-2024-49967" ref_url="https://www.suse.com/security/cve/CVE-2024-49967/" source="CVE"/>
		<reference ref_id="CVE-2024-49968" ref_url="https://www.suse.com/security/cve/CVE-2024-49968/" source="CVE"/>
		<reference ref_id="CVE-2024-49971" ref_url="https://www.suse.com/security/cve/CVE-2024-49971/" source="CVE"/>
		<reference ref_id="CVE-2024-49973" ref_url="https://www.suse.com/security/cve/CVE-2024-49973/" source="CVE"/>
		<reference ref_id="CVE-2024-49974" ref_url="https://www.suse.com/security/cve/CVE-2024-49974/" source="CVE"/>
		<reference ref_id="CVE-2024-49975" ref_url="https://www.suse.com/security/cve/CVE-2024-49975/" source="CVE"/>
		<reference ref_id="CVE-2024-49977" ref_url="https://www.suse.com/security/cve/CVE-2024-49977/" source="CVE"/>
		<reference ref_id="CVE-2024-49983" ref_url="https://www.suse.com/security/cve/CVE-2024-49983/" source="CVE"/>
		<reference ref_id="CVE-2024-49991" ref_url="https://www.suse.com/security/cve/CVE-2024-49991/" source="CVE"/>
		<reference ref_id="CVE-2024-49993" ref_url="https://www.suse.com/security/cve/CVE-2024-49993/" source="CVE"/>
		<reference ref_id="CVE-2024-49994" ref_url="https://www.suse.com/security/cve/CVE-2024-49994/" source="CVE"/>
		<reference ref_id="CVE-2024-49995" ref_url="https://www.suse.com/security/cve/CVE-2024-49995/" source="CVE"/>
		<reference ref_id="CVE-2024-49999" ref_url="https://www.suse.com/security/cve/CVE-2024-49999/" source="CVE"/>
		<reference ref_id="CVE-2024-50002" ref_url="https://www.suse.com/security/cve/CVE-2024-50002/" source="CVE"/>
		<reference ref_id="CVE-2024-50006" ref_url="https://www.suse.com/security/cve/CVE-2024-50006/" source="CVE"/>
		<reference ref_id="CVE-2024-50008" ref_url="https://www.suse.com/security/cve/CVE-2024-50008/" source="CVE"/>
		<reference ref_id="CVE-2024-50009" ref_url="https://www.suse.com/security/cve/CVE-2024-50009/" source="CVE"/>
		<reference ref_id="CVE-2024-50013" ref_url="https://www.suse.com/security/cve/CVE-2024-50013/" source="CVE"/>
		<reference ref_id="CVE-2024-50014" ref_url="https://www.suse.com/security/cve/CVE-2024-50014/" source="CVE"/>
		<reference ref_id="CVE-2024-50015" ref_url="https://www.suse.com/security/cve/CVE-2024-50015/" source="CVE"/>
		<reference ref_id="CVE-2024-50018" ref_url="https://www.suse.com/security/cve/CVE-2024-50018/" source="CVE"/>
		<reference ref_id="CVE-2024-50019" ref_url="https://www.suse.com/security/cve/CVE-2024-50019/" source="CVE"/>
		<reference ref_id="CVE-2024-50022" ref_url="https://www.suse.com/security/cve/CVE-2024-50022/" source="CVE"/>
		<reference ref_id="CVE-2024-50023" ref_url="https://www.suse.com/security/cve/CVE-2024-50023/" source="CVE"/>
		<reference ref_id="CVE-2024-50024" ref_url="https://www.suse.com/security/cve/CVE-2024-50024/" source="CVE"/>
		<reference ref_id="CVE-2024-50027" ref_url="https://www.suse.com/security/cve/CVE-2024-50027/" source="CVE"/>
		<reference ref_id="CVE-2024-50028" ref_url="https://www.suse.com/security/cve/CVE-2024-50028/" source="CVE"/>
		<reference ref_id="CVE-2024-50029" ref_url="https://www.suse.com/security/cve/CVE-2024-50029/" source="CVE"/>
		<reference ref_id="CVE-2024-50033" ref_url="https://www.suse.com/security/cve/CVE-2024-50033/" source="CVE"/>
		<reference ref_id="CVE-2024-50035" ref_url="https://www.suse.com/security/cve/CVE-2024-50035/" source="CVE"/>
		<reference ref_id="CVE-2024-50038" ref_url="https://www.suse.com/security/cve/CVE-2024-50038/" source="CVE"/>
		<reference ref_id="CVE-2024-50039" ref_url="https://www.suse.com/security/cve/CVE-2024-50039/" source="CVE"/>
		<reference ref_id="CVE-2024-50044" ref_url="https://www.suse.com/security/cve/CVE-2024-50044/" source="CVE"/>
		<reference ref_id="CVE-2024-50046" ref_url="https://www.suse.com/security/cve/CVE-2024-50046/" source="CVE"/>
		<reference ref_id="CVE-2024-50047" ref_url="https://www.suse.com/security/cve/CVE-2024-50047/" source="CVE"/>
		<reference ref_id="CVE-2024-50055" ref_url="https://www.suse.com/security/cve/CVE-2024-50055/" source="CVE"/>
		<reference ref_id="CVE-2024-50057" ref_url="https://www.suse.com/security/cve/CVE-2024-50057/" source="CVE"/>
		<reference ref_id="CVE-2024-50058" ref_url="https://www.suse.com/security/cve/CVE-2024-50058/" source="CVE"/>
		<reference ref_id="CVE-2024-50064" ref_url="https://www.suse.com/security/cve/CVE-2024-50064/" source="CVE"/>
		<reference ref_id="CVE-2024-50067" ref_url="https://www.suse.com/security/cve/CVE-2024-50067/" source="CVE"/>
		<reference ref_id="CVE-2024-50073" ref_url="https://www.suse.com/security/cve/CVE-2024-50073/" source="CVE"/>
		<reference ref_id="CVE-2024-50074" ref_url="https://www.suse.com/security/cve/CVE-2024-50074/" source="CVE"/>
		<reference ref_id="CVE-2024-50075" ref_url="https://www.suse.com/security/cve/CVE-2024-50075/" source="CVE"/>
		<reference ref_id="CVE-2024-50077" ref_url="https://www.suse.com/security/cve/CVE-2024-50077/" source="CVE"/>
		<reference ref_id="CVE-2024-50078" ref_url="https://www.suse.com/security/cve/CVE-2024-50078/" source="CVE"/>
		<reference ref_id="CVE-2024-50081" ref_url="https://www.suse.com/security/cve/CVE-2024-50081/" source="CVE"/>
		<reference ref_id="CVE-2024-50082" ref_url="https://www.suse.com/security/cve/CVE-2024-50082/" source="CVE"/>
		<reference ref_id="CVE-2024-50093" ref_url="https://www.suse.com/security/cve/CVE-2024-50093/" source="CVE"/>
		<reference ref_id="CVE-2024-50101" ref_url="https://www.suse.com/security/cve/CVE-2024-50101/" source="CVE"/>
		<reference ref_id="CVE-2024-50102" ref_url="https://www.suse.com/security/cve/CVE-2024-50102/" source="CVE"/>
		<reference ref_id="CVE-2024-50106" ref_url="https://www.suse.com/security/cve/CVE-2024-50106/" source="CVE"/>
		<reference ref_id="CVE-2024-50107" ref_url="https://www.suse.com/security/cve/CVE-2024-50107/" source="CVE"/>
		<reference ref_id="CVE-2024-50109" ref_url="https://www.suse.com/security/cve/CVE-2024-50109/" source="CVE"/>
		<reference ref_id="CVE-2024-50117" ref_url="https://www.suse.com/security/cve/CVE-2024-50117/" source="CVE"/>
		<reference ref_id="CVE-2024-50120" ref_url="https://www.suse.com/security/cve/CVE-2024-50120/" source="CVE"/>
		<reference ref_id="CVE-2024-50121" ref_url="https://www.suse.com/security/cve/CVE-2024-50121/" source="CVE"/>
		<reference ref_id="CVE-2024-50126" ref_url="https://www.suse.com/security/cve/CVE-2024-50126/" source="CVE"/>
		<reference ref_id="CVE-2024-50127" ref_url="https://www.suse.com/security/cve/CVE-2024-50127/" source="CVE"/>
		<reference ref_id="CVE-2024-50128" ref_url="https://www.suse.com/security/cve/CVE-2024-50128/" source="CVE"/>
		<reference ref_id="CVE-2024-50130" ref_url="https://www.suse.com/security/cve/CVE-2024-50130/" source="CVE"/>
		<reference ref_id="CVE-2024-50141" ref_url="https://www.suse.com/security/cve/CVE-2024-50141/" source="CVE"/>
		<reference ref_id="CVE-2024-50143" ref_url="https://www.suse.com/security/cve/CVE-2024-50143/" source="CVE"/>
		<reference ref_id="CVE-2024-50150" ref_url="https://www.suse.com/security/cve/CVE-2024-50150/" source="CVE"/>
		<reference ref_id="CVE-2024-50151" ref_url="https://www.suse.com/security/cve/CVE-2024-50151/" source="CVE"/>
		<reference ref_id="CVE-2024-50152" ref_url="https://www.suse.com/security/cve/CVE-2024-50152/" source="CVE"/>
		<reference ref_id="CVE-2024-50153" ref_url="https://www.suse.com/security/cve/CVE-2024-50153/" source="CVE"/>
		<reference ref_id="CVE-2024-50162" ref_url="https://www.suse.com/security/cve/CVE-2024-50162/" source="CVE"/>
		<reference ref_id="CVE-2024-50163" ref_url="https://www.suse.com/security/cve/CVE-2024-50163/" source="CVE"/>
		<reference ref_id="CVE-2024-50169" ref_url="https://www.suse.com/security/cve/CVE-2024-50169/" source="CVE"/>
		<reference ref_id="CVE-2024-50182" ref_url="https://www.suse.com/security/cve/CVE-2024-50182/" source="CVE"/>
		<reference ref_id="CVE-2024-50186" ref_url="https://www.suse.com/security/cve/CVE-2024-50186/" source="CVE"/>
		<reference ref_id="CVE-2024-50189" ref_url="https://www.suse.com/security/cve/CVE-2024-50189/" source="CVE"/>
		<reference ref_id="CVE-2024-50191" ref_url="https://www.suse.com/security/cve/CVE-2024-50191/" source="CVE"/>
		<reference ref_id="CVE-2024-50197" ref_url="https://www.suse.com/security/cve/CVE-2024-50197/" source="CVE"/>
		<reference ref_id="CVE-2024-50199" ref_url="https://www.suse.com/security/cve/CVE-2024-50199/" source="CVE"/>
		<reference ref_id="CVE-2024-50200" ref_url="https://www.suse.com/security/cve/CVE-2024-50200/" source="CVE"/>
		<reference ref_id="CVE-2024-50201" ref_url="https://www.suse.com/security/cve/CVE-2024-50201/" source="CVE"/>
		<reference ref_id="CVE-2024-50215" ref_url="https://www.suse.com/security/cve/CVE-2024-50215/" source="CVE"/>
		<reference ref_id="CVE-2024-50216" ref_url="https://www.suse.com/security/cve/CVE-2024-50216/" source="CVE"/>
		<reference ref_id="CVE-2024-50219" ref_url="https://www.suse.com/security/cve/CVE-2024-50219/" source="CVE"/>
		<reference ref_id="CVE-2024-50228" ref_url="https://www.suse.com/security/cve/CVE-2024-50228/" source="CVE"/>
		<reference ref_id="CVE-2024-50235" ref_url="https://www.suse.com/security/cve/CVE-2024-50235/" source="CVE"/>
		<reference ref_id="CVE-2024-50236" ref_url="https://www.suse.com/security/cve/CVE-2024-50236/" source="CVE"/>
		<reference ref_id="CVE-2024-50237" ref_url="https://www.suse.com/security/cve/CVE-2024-50237/" source="CVE"/>
		<reference ref_id="CVE-2024-50256" ref_url="https://www.suse.com/security/cve/CVE-2024-50256/" source="CVE"/>
		<reference ref_id="CVE-2024-50261" ref_url="https://www.suse.com/security/cve/CVE-2024-50261/" source="CVE"/>
		<reference ref_id="CVE-2024-50271" ref_url="https://www.suse.com/security/cve/CVE-2024-50271/" source="CVE"/>
		<reference ref_id="CVE-2024-50272" ref_url="https://www.suse.com/security/cve/CVE-2024-50272/" source="CVE"/>
		<reference ref_id="CVE-2024-50278" ref_url="https://www.suse.com/security/cve/CVE-2024-50278/" source="CVE"/>
		<reference ref_id="CVE-2024-50282" ref_url="https://www.suse.com/security/cve/CVE-2024-50282/" source="CVE"/>
		<reference ref_id="CVE-2024-50299" ref_url="https://www.suse.com/security/cve/CVE-2024-50299/" source="CVE"/>
		<reference ref_id="CVE-2024-50304" ref_url="https://www.suse.com/security/cve/CVE-2024-50304/" source="CVE"/>
		<reference ref_id="CVE-2024-53042" ref_url="https://www.suse.com/security/cve/CVE-2024-53042/" source="CVE"/>
		<reference ref_id="CVE-2024-53044" ref_url="https://www.suse.com/security/cve/CVE-2024-53044/" source="CVE"/>
		<reference ref_id="CVE-2024-53047" ref_url="https://www.suse.com/security/cve/CVE-2024-53047/" source="CVE"/>
		<reference ref_id="CVE-2024-53050" ref_url="https://www.suse.com/security/cve/CVE-2024-53050/" source="CVE"/>
		<reference ref_id="CVE-2024-53051" ref_url="https://www.suse.com/security/cve/CVE-2024-53051/" source="CVE"/>
		<reference ref_id="CVE-2024-53055" ref_url="https://www.suse.com/security/cve/CVE-2024-53055/" source="CVE"/>
		<reference ref_id="CVE-2024-53057" ref_url="https://www.suse.com/security/cve/CVE-2024-53057/" source="CVE"/>
		<reference ref_id="CVE-2024-53059" ref_url="https://www.suse.com/security/cve/CVE-2024-53059/" source="CVE"/>
		<reference ref_id="CVE-2024-53060" ref_url="https://www.suse.com/security/cve/CVE-2024-53060/" source="CVE"/>
		<reference ref_id="CVE-2024-53070" ref_url="https://www.suse.com/security/cve/CVE-2024-53070/" source="CVE"/>
		<reference ref_id="CVE-2024-53072" ref_url="https://www.suse.com/security/cve/CVE-2024-53072/" source="CVE"/>
		<reference ref_id="CVE-2024-53074" ref_url="https://www.suse.com/security/cve/CVE-2024-53074/" source="CVE"/>
		<reference ref_id="CVE-2024-53082" ref_url="https://www.suse.com/security/cve/CVE-2024-53082/" source="CVE"/>
		<reference ref_id="CVE-2024-53085" ref_url="https://www.suse.com/security/cve/CVE-2024-53085/" source="CVE"/>
		<reference ref_id="CVE-2024-53091" ref_url="https://www.suse.com/security/cve/CVE-2024-53091/" source="CVE"/>
		<reference ref_id="CVE-2024-53093" ref_url="https://www.suse.com/security/cve/CVE-2024-53093/" source="CVE"/>
		<reference ref_id="CVE-2024-53095" ref_url="https://www.suse.com/security/cve/CVE-2024-53095/" source="CVE"/>
		<reference ref_id="CVE-2024-53096" ref_url="https://www.suse.com/security/cve/CVE-2024-53096/" source="CVE"/>
		<reference ref_id="CVE-2024-53097" ref_url="https://www.suse.com/security/cve/CVE-2024-53097/" source="CVE"/>
		<reference ref_id="CVE-2024-53103" ref_url="https://www.suse.com/security/cve/CVE-2024-53103/" source="CVE"/>
		<reference ref_id="CVE-2024-53105" ref_url="https://www.suse.com/security/cve/CVE-2024-53105/" source="CVE"/>
		<reference ref_id="CVE-2024-53110" ref_url="https://www.suse.com/security/cve/CVE-2024-53110/" source="CVE"/>
		<reference ref_id="CVE-2024-53117" ref_url="https://www.suse.com/security/cve/CVE-2024-53117/" source="CVE"/>
		<reference ref_id="CVE-2024-53118" ref_url="https://www.suse.com/security/cve/CVE-2024-53118/" source="CVE"/>
		<reference ref_id="CVE-2024-53120" ref_url="https://www.suse.com/security/cve/CVE-2024-53120/" source="CVE"/>
		<reference ref_id="CVE-2024-53121" ref_url="https://www.suse.com/security/cve/CVE-2024-53121/" source="CVE"/>
		<reference ref_id="CVE-2024-53123" ref_url="https://www.suse.com/security/cve/CVE-2024-53123/" source="CVE"/>
		<reference ref_id="CVE-2024-53124" ref_url="https://www.suse.com/security/cve/CVE-2024-53124/" source="CVE"/>
		<reference ref_id="CVE-2024-53134" ref_url="https://www.suse.com/security/cve/CVE-2024-53134/" source="CVE"/>
		<reference ref_id="CVE-2024-53136" ref_url="https://www.suse.com/security/cve/CVE-2024-53136/" source="CVE"/>
		<reference ref_id="CVE-2024-53141" ref_url="https://www.suse.com/security/cve/CVE-2024-53141/" source="CVE"/>
		<reference ref_id="CVE-2024-53142" ref_url="https://www.suse.com/security/cve/CVE-2024-53142/" source="CVE"/>
		<reference ref_id="CVE-2024-53146" ref_url="https://www.suse.com/security/cve/CVE-2024-53146/" source="CVE"/>
		<reference ref_id="CVE-2024-53152" ref_url="https://www.suse.com/security/cve/CVE-2024-53152/" source="CVE"/>
		<reference ref_id="CVE-2024-53156" ref_url="https://www.suse.com/security/cve/CVE-2024-53156/" source="CVE"/>
		<reference ref_id="CVE-2024-53160" ref_url="https://www.suse.com/security/cve/CVE-2024-53160/" source="CVE"/>
		<reference ref_id="CVE-2024-53161" ref_url="https://www.suse.com/security/cve/CVE-2024-53161/" source="CVE"/>
		<reference ref_id="CVE-2024-53164" ref_url="https://www.suse.com/security/cve/CVE-2024-53164/" source="CVE"/>
		<reference ref_id="CVE-2024-53166" ref_url="https://www.suse.com/security/cve/CVE-2024-53166/" source="CVE"/>
		<reference ref_id="CVE-2024-53173" ref_url="https://www.suse.com/security/cve/CVE-2024-53173/" source="CVE"/>
		<reference ref_id="CVE-2024-53174" ref_url="https://www.suse.com/security/cve/CVE-2024-53174/" source="CVE"/>
		<reference ref_id="CVE-2024-53176" ref_url="https://www.suse.com/security/cve/CVE-2024-53176/" source="CVE"/>
		<reference ref_id="CVE-2024-53190" ref_url="https://www.suse.com/security/cve/CVE-2024-53190/" source="CVE"/>
		<reference ref_id="CVE-2024-53194" ref_url="https://www.suse.com/security/cve/CVE-2024-53194/" source="CVE"/>
		<reference ref_id="CVE-2024-53203" ref_url="https://www.suse.com/security/cve/CVE-2024-53203/" source="CVE"/>
		<reference ref_id="CVE-2024-53208" ref_url="https://www.suse.com/security/cve/CVE-2024-53208/" source="CVE"/>
		<reference ref_id="CVE-2024-53213" ref_url="https://www.suse.com/security/cve/CVE-2024-53213/" source="CVE"/>
		<reference ref_id="CVE-2024-53216" ref_url="https://www.suse.com/security/cve/CVE-2024-53216/" source="CVE"/>
		<reference ref_id="CVE-2024-53222" ref_url="https://www.suse.com/security/cve/CVE-2024-53222/" source="CVE"/>
		<reference ref_id="CVE-2024-53224" ref_url="https://www.suse.com/security/cve/CVE-2024-53224/" source="CVE"/>
		<reference ref_id="CVE-2024-53232" ref_url="https://www.suse.com/security/cve/CVE-2024-53232/" source="CVE"/>
		<reference ref_id="CVE-2024-53237" ref_url="https://www.suse.com/security/cve/CVE-2024-53237/" source="CVE"/>
		<reference ref_id="CVE-2024-53681" ref_url="https://www.suse.com/security/cve/CVE-2024-53681/" source="CVE"/>
		<reference ref_id="CVE-2024-54460" ref_url="https://www.suse.com/security/cve/CVE-2024-54460/" source="CVE"/>
		<reference ref_id="CVE-2024-54680" ref_url="https://www.suse.com/security/cve/CVE-2024-54680/" source="CVE"/>
		<reference ref_id="CVE-2024-56535" ref_url="https://www.suse.com/security/cve/CVE-2024-56535/" source="CVE"/>
		<reference ref_id="CVE-2024-56544" ref_url="https://www.suse.com/security/cve/CVE-2024-56544/" source="CVE"/>
		<reference ref_id="CVE-2024-56551" ref_url="https://www.suse.com/security/cve/CVE-2024-56551/" source="CVE"/>
		<reference ref_id="CVE-2024-56558" ref_url="https://www.suse.com/security/cve/CVE-2024-56558/" source="CVE"/>
		<reference ref_id="CVE-2024-56562" ref_url="https://www.suse.com/security/cve/CVE-2024-56562/" source="CVE"/>
		<reference ref_id="CVE-2024-56566" ref_url="https://www.suse.com/security/cve/CVE-2024-56566/" source="CVE"/>
		<reference ref_id="CVE-2024-56570" ref_url="https://www.suse.com/security/cve/CVE-2024-56570/" source="CVE"/>
		<reference ref_id="CVE-2024-56590" ref_url="https://www.suse.com/security/cve/CVE-2024-56590/" source="CVE"/>
		<reference ref_id="CVE-2024-56591" ref_url="https://www.suse.com/security/cve/CVE-2024-56591/" source="CVE"/>
		<reference ref_id="CVE-2024-56600" ref_url="https://www.suse.com/security/cve/CVE-2024-56600/" source="CVE"/>
		<reference ref_id="CVE-2024-56601" ref_url="https://www.suse.com/security/cve/CVE-2024-56601/" source="CVE"/>
		<reference ref_id="CVE-2024-56602" ref_url="https://www.suse.com/security/cve/CVE-2024-56602/" source="CVE"/>
		<reference ref_id="CVE-2024-56604" ref_url="https://www.suse.com/security/cve/CVE-2024-56604/" source="CVE"/>
		<reference ref_id="CVE-2024-56605" ref_url="https://www.suse.com/security/cve/CVE-2024-56605/" source="CVE"/>
		<reference ref_id="CVE-2024-56611" ref_url="https://www.suse.com/security/cve/CVE-2024-56611/" source="CVE"/>
		<reference ref_id="CVE-2024-56614" ref_url="https://www.suse.com/security/cve/CVE-2024-56614/" source="CVE"/>
		<reference ref_id="CVE-2024-56616" ref_url="https://www.suse.com/security/cve/CVE-2024-56616/" source="CVE"/>
		<reference ref_id="CVE-2024-56623" ref_url="https://www.suse.com/security/cve/CVE-2024-56623/" source="CVE"/>
		<reference ref_id="CVE-2024-56631" ref_url="https://www.suse.com/security/cve/CVE-2024-56631/" source="CVE"/>
		<reference ref_id="CVE-2024-56642" ref_url="https://www.suse.com/security/cve/CVE-2024-56642/" source="CVE"/>
		<reference ref_id="CVE-2024-56644" ref_url="https://www.suse.com/security/cve/CVE-2024-56644/" source="CVE"/>
		<reference ref_id="CVE-2024-56647" ref_url="https://www.suse.com/security/cve/CVE-2024-56647/" source="CVE"/>
		<reference ref_id="CVE-2024-56653" ref_url="https://www.suse.com/security/cve/CVE-2024-56653/" source="CVE"/>
		<reference ref_id="CVE-2024-56654" ref_url="https://www.suse.com/security/cve/CVE-2024-56654/" source="CVE"/>
		<reference ref_id="CVE-2024-56663" ref_url="https://www.suse.com/security/cve/CVE-2024-56663/" source="CVE"/>
		<reference ref_id="CVE-2024-56664" ref_url="https://www.suse.com/security/cve/CVE-2024-56664/" source="CVE"/>
		<reference ref_id="CVE-2024-56667" ref_url="https://www.suse.com/security/cve/CVE-2024-56667/" source="CVE"/>
		<reference ref_id="CVE-2024-56688" ref_url="https://www.suse.com/security/cve/CVE-2024-56688/" source="CVE"/>
		<reference ref_id="CVE-2024-56693" ref_url="https://www.suse.com/security/cve/CVE-2024-56693/" source="CVE"/>
		<reference ref_id="CVE-2024-56729" ref_url="https://www.suse.com/security/cve/CVE-2024-56729/" source="CVE"/>
		<reference ref_id="CVE-2024-56757" ref_url="https://www.suse.com/security/cve/CVE-2024-56757/" source="CVE"/>
		<reference ref_id="CVE-2024-56760" ref_url="https://www.suse.com/security/cve/CVE-2024-56760/" source="CVE"/>
		<reference ref_id="CVE-2024-56779" ref_url="https://www.suse.com/security/cve/CVE-2024-56779/" source="CVE"/>
		<reference ref_id="CVE-2024-56783" ref_url="https://www.suse.com/security/cve/CVE-2024-56783/" source="CVE"/>
		<reference ref_id="CVE-2024-57798" ref_url="https://www.suse.com/security/cve/CVE-2024-57798/" source="CVE"/>
		<reference ref_id="CVE-2024-57809" ref_url="https://www.suse.com/security/cve/CVE-2024-57809/" source="CVE"/>
		<reference ref_id="CVE-2024-57843" ref_url="https://www.suse.com/security/cve/CVE-2024-57843/" source="CVE"/>
		<reference ref_id="CVE-2024-57852" ref_url="https://www.suse.com/security/cve/CVE-2024-57852/" source="CVE"/>
		<reference ref_id="CVE-2024-57879" ref_url="https://www.suse.com/security/cve/CVE-2024-57879/" source="CVE"/>
		<reference ref_id="CVE-2024-57884" ref_url="https://www.suse.com/security/cve/CVE-2024-57884/" source="CVE"/>
		<reference ref_id="CVE-2024-57885" ref_url="https://www.suse.com/security/cve/CVE-2024-57885/" source="CVE"/>
		<reference ref_id="CVE-2024-57888" ref_url="https://www.suse.com/security/cve/CVE-2024-57888/" source="CVE"/>
		<reference ref_id="CVE-2024-57890" ref_url="https://www.suse.com/security/cve/CVE-2024-57890/" source="CVE"/>
		<reference ref_id="CVE-2024-57894" ref_url="https://www.suse.com/security/cve/CVE-2024-57894/" source="CVE"/>
		<reference ref_id="CVE-2024-57898" ref_url="https://www.suse.com/security/cve/CVE-2024-57898/" source="CVE"/>
		<reference ref_id="CVE-2024-57903" ref_url="https://www.suse.com/security/cve/CVE-2024-57903/" source="CVE"/>
		<reference ref_id="CVE-2024-57929" ref_url="https://www.suse.com/security/cve/CVE-2024-57929/" source="CVE"/>
		<reference ref_id="CVE-2024-57931" ref_url="https://www.suse.com/security/cve/CVE-2024-57931/" source="CVE"/>
		<reference ref_id="CVE-2024-57940" ref_url="https://www.suse.com/security/cve/CVE-2024-57940/" source="CVE"/>
		<reference ref_id="CVE-2024-58009" ref_url="https://www.suse.com/security/cve/CVE-2024-58009/" source="CVE"/>
		<reference ref_id="CVE-2024-58064" ref_url="https://www.suse.com/security/cve/CVE-2024-58064/" source="CVE"/>
		<reference ref_id="CVE-2024-58099" ref_url="https://www.suse.com/security/cve/CVE-2024-58099/" source="CVE"/>
		<reference ref_id="CVE-2025-1272" ref_url="https://www.suse.com/security/cve/CVE-2025-1272/" source="CVE"/>
		<reference ref_id="CVE-2025-21646" ref_url="https://www.suse.com/security/cve/CVE-2025-21646/" source="CVE"/>
		<reference ref_id="CVE-2025-21663" ref_url="https://www.suse.com/security/cve/CVE-2025-21663/" source="CVE"/>
		<reference ref_id="CVE-2025-21666" ref_url="https://www.suse.com/security/cve/CVE-2025-21666/" source="CVE"/>
		<reference ref_id="CVE-2025-21668" ref_url="https://www.suse.com/security/cve/CVE-2025-21668/" source="CVE"/>
		<reference ref_id="CVE-2025-21669" ref_url="https://www.suse.com/security/cve/CVE-2025-21669/" source="CVE"/>
		<reference ref_id="CVE-2025-21689" ref_url="https://www.suse.com/security/cve/CVE-2025-21689/" source="CVE"/>
		<reference ref_id="CVE-2025-21694" ref_url="https://www.suse.com/security/cve/CVE-2025-21694/" source="CVE"/>
		<reference ref_id="CVE-2025-21888" ref_url="https://www.suse.com/security/cve/CVE-2025-21888/" source="CVE"/>
		<reference ref_id="CVE-2025-22087" ref_url="https://www.suse.com/security/cve/CVE-2025-22087/" source="CVE"/>
		<reference ref_id="CVE-2025-68179" ref_url="https://www.suse.com/security/cve/CVE-2025-68179/" source="CVE"/>
		<reference ref_id="CVE-2025-71151" ref_url="https://www.suse.com/security/cve/CVE-2025-71151/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:6966.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:6966.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48969/">CVE-2022-48969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48969">CVE-2022-48969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48989/">CVE-2022-48989 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48989">CVE-2022-48989 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49006/">CVE-2022-49006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49006">CVE-2022-49006 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49014/">CVE-2022-49014 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49014">CVE-2022-49014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49029/">CVE-2022-49029 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49029">CVE-2022-49029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49747/">CVE-2022-49747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49747">CVE-2022-49747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49778/">CVE-2022-49778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49778">CVE-2022-49778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49804/">CVE-2022-49804 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49804">CVE-2022-49804 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49815/">CVE-2022-49815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49815">CVE-2022-49815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50112/">CVE-2022-50112 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50112">CVE-2022-50112 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50121/">CVE-2022-50121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50121">CVE-2022-50121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50159/">CVE-2022-50159 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50159">CVE-2022-50159 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50214/">CVE-2022-50214 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50214">CVE-2022-50214 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50319/">CVE-2022-50319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50319">CVE-2022-50319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50421/">CVE-2022-50421 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50421">CVE-2022-50421 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50491/">CVE-2022-50491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50491">CVE-2022-50491 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50511/">CVE-2022-50511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50511">CVE-2022-50511 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50614/">CVE-2022-50614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50614">CVE-2022-50614 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50743/">CVE-2022-50743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50743">CVE-2022-50743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50811/">CVE-2022-50811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50811">CVE-2022-50811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52672/">CVE-2023-52672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52672">CVE-2023-52672 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52917/">CVE-2023-52917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52917">CVE-2023-52917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53066/">CVE-2023-53066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53066">CVE-2023-53066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53117/">CVE-2023-53117 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53117">CVE-2023-53117 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53196/">CVE-2023-53196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53196">CVE-2023-53196 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53260/">CVE-2023-53260 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53260">CVE-2023-53260 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53261/">CVE-2023-53261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53261">CVE-2023-53261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53287/">CVE-2023-53287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53287">CVE-2023-53287 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53510/">CVE-2023-53510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53510">CVE-2023-53510 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53519/">CVE-2023-53519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53519">CVE-2023-53519 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53555/">CVE-2023-53555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53555">CVE-2023-53555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53568/">CVE-2023-53568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53568">CVE-2023-53568 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53595/">CVE-2023-53595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53595">CVE-2023-53595 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53654/">CVE-2023-53654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53654">CVE-2023-53654 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53859/">CVE-2023-53859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53859">CVE-2023-53859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53989/">CVE-2023-53989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53989">CVE-2023-53989 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54089/">CVE-2023-54089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54089">CVE-2023-54089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54117/">CVE-2023-54117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54117">CVE-2023-54117 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54230/">CVE-2023-54230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54230">CVE-2023-54230 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54278/">CVE-2023-54278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54278">CVE-2023-54278 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54313/">CVE-2023-54313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54313">CVE-2023-54313 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54322/">CVE-2023-54322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54322">CVE-2023-54322 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27008/">CVE-2024-27008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27008">CVE-2024-27008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27398/">CVE-2024-27398 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27398">CVE-2024-27398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35891/">CVE-2024-35891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35891">CVE-2024-35891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35933/">CVE-2024-35933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35933">CVE-2024-35933 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35934/">CVE-2024-35934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35934">CVE-2024-35934 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35963/">CVE-2024-35963 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35963">CVE-2024-35963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35964/">CVE-2024-35964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35964">CVE-2024-35964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35965/">CVE-2024-35965 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35965">CVE-2024-35965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35966/">CVE-2024-35966 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35966">CVE-2024-35966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35967/">CVE-2024-35967 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35967">CVE-2024-35967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35978/">CVE-2024-35978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35978">CVE-2024-35978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36011/">CVE-2024-36011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36011">CVE-2024-36011 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36012/">CVE-2024-36012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36012">CVE-2024-36012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36013/">CVE-2024-36013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36013">CVE-2024-36013 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36880/">CVE-2024-36880 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36880">CVE-2024-36880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36968/">CVE-2024-36968 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36968">CVE-2024-36968 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38541/">CVE-2024-38541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39500/">CVE-2024-39500 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39500">CVE-2024-39500 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40956/">CVE-2024-40956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41010/">CVE-2024-41010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41010">CVE-2024-41010 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-42094/">CVE-2024-42094 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42094">CVE-2024-42094 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42133/">CVE-2024-42133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42133">CVE-2024-42133 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42253/">CVE-2024-42253 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42253">CVE-2024-42253 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-42265/">CVE-2024-42265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42278/">CVE-2024-42278 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42278">CVE-2024-42278 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42291/">CVE-2024-42291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42291">CVE-2024-42291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42294/">CVE-2024-42294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42294">CVE-2024-42294 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42302/">CVE-2024-42302 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42302">CVE-2024-42302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42304/">CVE-2024-42304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42304">CVE-2024-42304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42305/">CVE-2024-42305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42305">CVE-2024-42305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42312/">CVE-2024-42312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42312">CVE-2024-42312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42315/">CVE-2024-42315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42315">CVE-2024-42315 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42316/">CVE-2024-42316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42316">CVE-2024-42316 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42321/">CVE-2024-42321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42321">CVE-2024-42321 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43820/">CVE-2024-43820 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43820">CVE-2024-43820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43821/">CVE-2024-43821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43821">CVE-2024-43821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43823/">CVE-2024-43823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43823">CVE-2024-43823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43828/">CVE-2024-43828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43828">CVE-2024-43828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43834/">CVE-2024-43834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43834">CVE-2024-43834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43846/">CVE-2024-43846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43846">CVE-2024-43846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43853/">CVE-2024-43853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43871/">CVE-2024-43871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43873/">CVE-2024-43873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43873">CVE-2024-43873 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43882/">CVE-2024-43882 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43884/">CVE-2024-43884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43884">CVE-2024-43884 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43889/">CVE-2024-43889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43898/">CVE-2024-43898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43898">CVE-2024-43898 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43910/">CVE-2024-43910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43910">CVE-2024-43910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43914/">CVE-2024-43914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43914">CVE-2024-43914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44931/">CVE-2024-44931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44931">CVE-2024-44931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44932/">CVE-2024-44932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44932">CVE-2024-44932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44934/">CVE-2024-44934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44934">CVE-2024-44934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44952/">CVE-2024-44952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44952">CVE-2024-44952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44958/">CVE-2024-44958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44958">CVE-2024-44958 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44964/">CVE-2024-44964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44964">CVE-2024-44964 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="8.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44975/">CVE-2024-44975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44975">CVE-2024-44975 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44987/">CVE-2024-44987 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44987">CVE-2024-44987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44989/">CVE-2024-44989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44989">CVE-2024-44989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45000/">CVE-2024-45000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45000">CVE-2024-45000 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-45009/">CVE-2024-45009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45009">CVE-2024-45009 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-45010/">CVE-2024-45010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45010">CVE-2024-45010 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45016/">CVE-2024-45016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45016">CVE-2024-45016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45022/">CVE-2024-45022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45022">CVE-2024-45022 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46673/">CVE-2024-46673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46673">CVE-2024-46673 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46675/">CVE-2024-46675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46675">CVE-2024-46675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46711/">CVE-2024-46711 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46711">CVE-2024-46711 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46722/">CVE-2024-46722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46722">CVE-2024-46722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46723/">CVE-2024-46723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46723">CVE-2024-46723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46724/">CVE-2024-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46724">CVE-2024-46724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46725/">CVE-2024-46725 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46725">CVE-2024-46725 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46743/">CVE-2024-46743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46743">CVE-2024-46743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46745/">CVE-2024-46745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46745">CVE-2024-46745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46747/">CVE-2024-46747 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46747">CVE-2024-46747 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46750/">CVE-2024-46750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46750">CVE-2024-46750 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46754/">CVE-2024-46754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46754">CVE-2024-46754 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46756/">CVE-2024-46756 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46756">CVE-2024-46756 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46758/">CVE-2024-46758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46758">CVE-2024-46758 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46759/">CVE-2024-46759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46759">CVE-2024-46759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46761/">CVE-2024-46761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46761">CVE-2024-46761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46783/">CVE-2024-46783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46783">CVE-2024-46783 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46786/">CVE-2024-46786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46786">CVE-2024-46786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46787/">CVE-2024-46787 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46787">CVE-2024-46787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46800/">CVE-2024-46800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46800">CVE-2024-46800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46805/">CVE-2024-46805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46805">CVE-2024-46805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46806/">CVE-2024-46806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46806">CVE-2024-46806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46807/">CVE-2024-46807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46807">CVE-2024-46807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46819/">CVE-2024-46819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46819">CVE-2024-46819 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46820/">CVE-2024-46820 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46820">CVE-2024-46820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46822/">CVE-2024-46822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46822">CVE-2024-46822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46828/">CVE-2024-46828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46828">CVE-2024-46828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46835/">CVE-2024-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46835">CVE-2024-46835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46839/">CVE-2024-46839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46839">CVE-2024-46839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46853/">CVE-2024-46853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46853">CVE-2024-46853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46864/">CVE-2024-46864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46864">CVE-2024-46864 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46871/">CVE-2024-46871 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46871">CVE-2024-46871 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47141/">CVE-2024-47141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47141">CVE-2024-47141 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47660/">CVE-2024-47660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47660">CVE-2024-47660 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47668/">CVE-2024-47668 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47668">CVE-2024-47668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47678/">CVE-2024-47678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47678">CVE-2024-47678 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47685/">CVE-2024-47685 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47685">CVE-2024-47685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47687/">CVE-2024-47687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47687">CVE-2024-47687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47692/">CVE-2024-47692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47692">CVE-2024-47692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47700/">CVE-2024-47700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47700">CVE-2024-47700 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47703/">CVE-2024-47703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47703">CVE-2024-47703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47705/">CVE-2024-47705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47705">CVE-2024-47705 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47706/">CVE-2024-47706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47706">CVE-2024-47706 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47710/">CVE-2024-47710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47710">CVE-2024-47710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47713/">CVE-2024-47713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47713">CVE-2024-47713 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47715/">CVE-2024-47715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47715">CVE-2024-47715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47718/">CVE-2024-47718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47718">CVE-2024-47718 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47719/">CVE-2024-47719 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47719">CVE-2024-47719 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47737/">CVE-2024-47737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47737">CVE-2024-47737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47738/">CVE-2024-47738 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47738">CVE-2024-47738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47739/">CVE-2024-47739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47739">CVE-2024-47739 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47745/">CVE-2024-47745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47745">CVE-2024-47745 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47748/">CVE-2024-47748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48873/">CVE-2024-48873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48873">CVE-2024-48873 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49569/">CVE-2024-49569 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49569">CVE-2024-49569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49851/">CVE-2024-49851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49851">CVE-2024-49851 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49856/">CVE-2024-49856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49856">CVE-2024-49856 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49860/">CVE-2024-49860 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49861/">CVE-2024-49861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49861">CVE-2024-49861 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49862/">CVE-2024-49862 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49862">CVE-2024-49862 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49870/">CVE-2024-49870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49875/">CVE-2024-49875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49878/">CVE-2024-49878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49878">CVE-2024-49878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49881/">CVE-2024-49881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49882/">CVE-2024-49882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49883/">CVE-2024-49883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49884/">CVE-2024-49884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49884">CVE-2024-49884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49885/">CVE-2024-49885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49885">CVE-2024-49885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49886/">CVE-2024-49886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49889/">CVE-2024-49889 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49889">CVE-2024-49889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49904/">CVE-2024-49904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49904">CVE-2024-49904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49927/">CVE-2024-49927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49927">CVE-2024-49927 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49928/">CVE-2024-49928 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49928">CVE-2024-49928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49929/">CVE-2024-49929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49930/">CVE-2024-49930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49933/">CVE-2024-49933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49934/">CVE-2024-49934 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49934">CVE-2024-49934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49935/">CVE-2024-49935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49937/">CVE-2024-49937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49937">CVE-2024-49937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49938/">CVE-2024-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49939/">CVE-2024-49939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49946/">CVE-2024-49946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49948/">CVE-2024-49948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49948">CVE-2024-49948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49950/">CVE-2024-49950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49951/">CVE-2024-49951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49951">CVE-2024-49951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49954/">CVE-2024-49954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49959/">CVE-2024-49959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49960/">CVE-2024-49960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49962/">CVE-2024-49962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49967/">CVE-2024-49967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49968/">CVE-2024-49968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49968">CVE-2024-49968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49971/">CVE-2024-49971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49971">CVE-2024-49971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49973/">CVE-2024-49973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49974/">CVE-2024-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49974">CVE-2024-49974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49975/">CVE-2024-49975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49975">CVE-2024-49975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49977/">CVE-2024-49977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49977">CVE-2024-49977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49983/">CVE-2024-49983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49991/">CVE-2024-49991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49993/">CVE-2024-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49993">CVE-2024-49993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49994/">CVE-2024-49994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49994">CVE-2024-49994 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49995/">CVE-2024-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49999/">CVE-2024-49999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49999">CVE-2024-49999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50002/">CVE-2024-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50006/">CVE-2024-50006 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50008/">CVE-2024-50008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50009/">CVE-2024-50009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50009">CVE-2024-50009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50013/">CVE-2024-50013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50014/">CVE-2024-50014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50014">CVE-2024-50014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50015/">CVE-2024-50015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50015">CVE-2024-50015 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50018/">CVE-2024-50018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50018">CVE-2024-50018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50019/">CVE-2024-50019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50022/">CVE-2024-50022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50022">CVE-2024-50022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50023/">CVE-2024-50023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50023">CVE-2024-50023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50024/">CVE-2024-50024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50027/">CVE-2024-50027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50027">CVE-2024-50027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50028/">CVE-2024-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50028">CVE-2024-50028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50029/">CVE-2024-50029 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50029">CVE-2024-50029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50033/">CVE-2024-50033 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50035/">CVE-2024-50035 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50038/">CVE-2024-50038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50038">CVE-2024-50038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50039/">CVE-2024-50039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50039">CVE-2024-50039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50044/">CVE-2024-50044 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50046/">CVE-2024-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50047/">CVE-2024-50047 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50055/">CVE-2024-50055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50057/">CVE-2024-50057 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50057">CVE-2024-50057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50058/">CVE-2024-50058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50064/">CVE-2024-50064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50064">CVE-2024-50064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50067/">CVE-2024-50067 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50067">CVE-2024-50067 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50073/">CVE-2024-50073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50074/">CVE-2024-50074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50075/">CVE-2024-50075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50075">CVE-2024-50075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50077/">CVE-2024-50077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50078/">CVE-2024-50078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50081/">CVE-2024-50081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50081">CVE-2024-50081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50082/">CVE-2024-50082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50093/">CVE-2024-50093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50101/">CVE-2024-50101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50101">CVE-2024-50101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50102/">CVE-2024-50102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50102">CVE-2024-50102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50106/">CVE-2024-50106 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50106">CVE-2024-50106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50107/">CVE-2024-50107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50107">CVE-2024-50107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50109/">CVE-2024-50109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50109">CVE-2024-50109 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50117/">CVE-2024-50117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50117">CVE-2024-50117 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50120/">CVE-2024-50120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50120">CVE-2024-50120 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50121/">CVE-2024-50121 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50121">CVE-2024-50121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50126/">CVE-2024-50126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50126">CVE-2024-50126 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50127/">CVE-2024-50127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50128/">CVE-2024-50128 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50130/">CVE-2024-50130 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50130">CVE-2024-50130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50141/">CVE-2024-50141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50141">CVE-2024-50141 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50143/">CVE-2024-50143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50143">CVE-2024-50143 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50150/">CVE-2024-50150 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50151/">CVE-2024-50151 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50151">CVE-2024-50151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50152/">CVE-2024-50152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50152">CVE-2024-50152 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50153/">CVE-2024-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50162/">CVE-2024-50162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50162">CVE-2024-50162 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50163/">CVE-2024-50163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50163">CVE-2024-50163 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50169/">CVE-2024-50169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50169">CVE-2024-50169 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50182/">CVE-2024-50182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50186/">CVE-2024-50186 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50189/">CVE-2024-50189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50191/">CVE-2024-50191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50191">CVE-2024-50191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50197/">CVE-2024-50197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50197">CVE-2024-50197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50199/">CVE-2024-50199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50199">CVE-2024-50199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50200/">CVE-2024-50200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50200">CVE-2024-50200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50201/">CVE-2024-50201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50215/">CVE-2024-50215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50215">CVE-2024-50215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50216/">CVE-2024-50216 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50216">CVE-2024-50216 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50219/">CVE-2024-50219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50219">CVE-2024-50219 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50228/">CVE-2024-50228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50228">CVE-2024-50228 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50235/">CVE-2024-50235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50235">CVE-2024-50235 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50236/">CVE-2024-50236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50237/">CVE-2024-50237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50256/">CVE-2024-50256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50256">CVE-2024-50256 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50261/">CVE-2024-50261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50271/">CVE-2024-50271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50271">CVE-2024-50271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50272/">CVE-2024-50272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50272">CVE-2024-50272 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50278/">CVE-2024-50278 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50278">CVE-2024-50278 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50282/">CVE-2024-50282 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50282">CVE-2024-50282 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50299/">CVE-2024-50299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50299">CVE-2024-50299 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50304/">CVE-2024-50304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50304">CVE-2024-50304 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53042/">CVE-2024-53042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53042">CVE-2024-53042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53044/">CVE-2024-53044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53044">CVE-2024-53044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53047/">CVE-2024-53047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53047">CVE-2024-53047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53050/">CVE-2024-53050 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53050">CVE-2024-53050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53051/">CVE-2024-53051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53051">CVE-2024-53051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53055/">CVE-2024-53055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53055">CVE-2024-53055 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53057/">CVE-2024-53057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53057">CVE-2024-53057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53059/">CVE-2024-53059 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53059">CVE-2024-53059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53060/">CVE-2024-53060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53060">CVE-2024-53060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53070/">CVE-2024-53070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53070">CVE-2024-53070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53072/">CVE-2024-53072 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53072">CVE-2024-53072 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53074/">CVE-2024-53074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53074">CVE-2024-53074 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53082/">CVE-2024-53082 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53082">CVE-2024-53082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53085/">CVE-2024-53085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53085">CVE-2024-53085 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53091/">CVE-2024-53091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53091">CVE-2024-53091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53093/">CVE-2024-53093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53093">CVE-2024-53093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53095/">CVE-2024-53095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53095">CVE-2024-53095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53096/">CVE-2024-53096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53096">CVE-2024-53096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53097/">CVE-2024-53097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53097">CVE-2024-53097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53103/">CVE-2024-53103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53103">CVE-2024-53103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53105/">CVE-2024-53105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53105">CVE-2024-53105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53110/">CVE-2024-53110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53110">CVE-2024-53110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53117/">CVE-2024-53117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53117">CVE-2024-53117 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53118/">CVE-2024-53118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53118">CVE-2024-53118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53120/">CVE-2024-53120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53120">CVE-2024-53120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53121/">CVE-2024-53121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53121">CVE-2024-53121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53123/">CVE-2024-53123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53123">CVE-2024-53123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53124/">CVE-2024-53124 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53124">CVE-2024-53124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53134/">CVE-2024-53134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53134">CVE-2024-53134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53136/">CVE-2024-53136 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53136">CVE-2024-53136 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53141/">CVE-2024-53141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53141">CVE-2024-53141 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-53142/">CVE-2024-53142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53142">CVE-2024-53142 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53146/">CVE-2024-53146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53146">CVE-2024-53146 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53152/">CVE-2024-53152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53152">CVE-2024-53152 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53156/">CVE-2024-53156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53156">CVE-2024-53156 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53160/">CVE-2024-53160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53160">CVE-2024-53160 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53161/">CVE-2024-53161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53161">CVE-2024-53161 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53164/">CVE-2024-53164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53166/">CVE-2024-53166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53166">CVE-2024-53166 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53173/">CVE-2024-53173 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53173">CVE-2024-53173 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53174/">CVE-2024-53174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53174">CVE-2024-53174 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53176/">CVE-2024-53176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53176">CVE-2024-53176 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53190/">CVE-2024-53190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53190">CVE-2024-53190 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53194/">CVE-2024-53194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53194">CVE-2024-53194 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53203/">CVE-2024-53203 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53203">CVE-2024-53203 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53208/">CVE-2024-53208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53208">CVE-2024-53208 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53213/">CVE-2024-53213 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53213">CVE-2024-53213 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53216/">CVE-2024-53216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53216">CVE-2024-53216 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53222/">CVE-2024-53222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53222">CVE-2024-53222 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53224/">CVE-2024-53224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53224">CVE-2024-53224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53232/">CVE-2024-53232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53232">CVE-2024-53232 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53237/">CVE-2024-53237 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53237">CVE-2024-53237 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53681/">CVE-2024-53681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53681">CVE-2024-53681 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54460/">CVE-2024-54460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54460">CVE-2024-54460 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54680/">CVE-2024-54680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56535/">CVE-2024-56535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56535">CVE-2024-56535 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56544/">CVE-2024-56544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56544">CVE-2024-56544 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56551/">CVE-2024-56551 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56551">CVE-2024-56551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56558/">CVE-2024-56558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56558">CVE-2024-56558 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56562/">CVE-2024-56562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56562">CVE-2024-56562 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56566/">CVE-2024-56566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56566">CVE-2024-56566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56570/">CVE-2024-56570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56570">CVE-2024-56570 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56590/">CVE-2024-56590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56591/">CVE-2024-56591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56591">CVE-2024-56591 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56600/">CVE-2024-56600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56601/">CVE-2024-56601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56602/">CVE-2024-56602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56604/">CVE-2024-56604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56605/">CVE-2024-56605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56611/">CVE-2024-56611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56611">CVE-2024-56611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56614/">CVE-2024-56614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56616/">CVE-2024-56616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56616">CVE-2024-56616 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56623/">CVE-2024-56623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56631/">CVE-2024-56631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56642/">CVE-2024-56642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56644/">CVE-2024-56644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56647/">CVE-2024-56647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56647">CVE-2024-56647 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56653/">CVE-2024-56653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56654/">CVE-2024-56654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56663/">CVE-2024-56663 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56664/">CVE-2024-56664 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56667/">CVE-2024-56667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56688/">CVE-2024-56688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56688">CVE-2024-56688 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56693/">CVE-2024-56693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56693">CVE-2024-56693 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56729/">CVE-2024-56729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56729">CVE-2024-56729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56757/">CVE-2024-56757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56757">CVE-2024-56757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56760/">CVE-2024-56760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56760">CVE-2024-56760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56779/">CVE-2024-56779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56779">CVE-2024-56779 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56783/">CVE-2024-56783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56783">CVE-2024-56783 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57798/">CVE-2024-57798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57798">CVE-2024-57798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57809/">CVE-2024-57809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57809">CVE-2024-57809 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="6.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-57843/">CVE-2024-57843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57843">CVE-2024-57843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57852/">CVE-2024-57852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57852">CVE-2024-57852 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57879/">CVE-2024-57879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57879">CVE-2024-57879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57884/">CVE-2024-57884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57884">CVE-2024-57884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57885/">CVE-2024-57885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57885">CVE-2024-57885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57888/">CVE-2024-57888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57888">CVE-2024-57888 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57890/">CVE-2024-57890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57890">CVE-2024-57890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57894/">CVE-2024-57894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57894">CVE-2024-57894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57898/">CVE-2024-57898 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57898">CVE-2024-57898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57903/">CVE-2024-57903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57903">CVE-2024-57903 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57929/">CVE-2024-57929 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57929">CVE-2024-57929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57931/">CVE-2024-57931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57931">CVE-2024-57931 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57940/">CVE-2024-57940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57940">CVE-2024-57940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58009/">CVE-2024-58009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58009">CVE-2024-58009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58064/">CVE-2024-58064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58064">CVE-2024-58064 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58099/">CVE-2024-58099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58099">CVE-2024-58099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1272/">CVE-2025-1272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1272">CVE-2025-1272 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21646/">CVE-2025-21646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21646">CVE-2025-21646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21663/">CVE-2025-21663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21663">CVE-2025-21663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21666/">CVE-2025-21666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21666">CVE-2025-21666 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21668/">CVE-2025-21668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21668">CVE-2025-21668 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21669/">CVE-2025-21669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21669">CVE-2025-21669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21689/">CVE-2025-21689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21689">CVE-2025-21689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21694/">CVE-2025-21694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21694">CVE-2025-21694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21888/">CVE-2025-21888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21888">CVE-2025-21888 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22087/">CVE-2025-22087 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22087">CVE-2025-22087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68179/">CVE-2025-68179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68179">CVE-2025-68179 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71151/">CVE-2025-71151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71151">CVE-2025-71151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4743" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:6977.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:6977.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983856" comment="python-unversioned-command-3.9.21-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983857" comment="python3-3.9.21-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983858" comment="python3-debug-3.9.21-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983859" comment="python3-devel-3.9.21-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983860" comment="python3-idle-3.9.21-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983861" comment="python3-libs-3.9.21-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983862" comment="python3-test-3.9.21-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983863" comment="python3-tkinter-3.9.21-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4744" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-45774" ref_url="https://www.suse.com/security/cve/CVE-2024-45774/" source="CVE"/>
		<reference ref_id="CVE-2024-45775" ref_url="https://www.suse.com/security/cve/CVE-2024-45775/" source="CVE"/>
		<reference ref_id="CVE-2024-45776" ref_url="https://www.suse.com/security/cve/CVE-2024-45776/" source="CVE"/>
		<reference ref_id="CVE-2024-45781" ref_url="https://www.suse.com/security/cve/CVE-2024-45781/" source="CVE"/>
		<reference ref_id="CVE-2024-45783" ref_url="https://www.suse.com/security/cve/CVE-2024-45783/" source="CVE"/>
		<reference ref_id="CVE-2025-0622" ref_url="https://www.suse.com/security/cve/CVE-2025-0622/" source="CVE"/>
		<reference ref_id="CVE-2025-0677" ref_url="https://www.suse.com/security/cve/CVE-2025-0677/" source="CVE"/>
		<reference ref_id="CVE-2025-0690" ref_url="https://www.suse.com/security/cve/CVE-2025-0690/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:6990.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:6990.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45774/">CVE-2024-45774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45774">CVE-2024-45774 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45775/">CVE-2024-45775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45775">CVE-2024-45775 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45776/">CVE-2024-45776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45776">CVE-2024-45776 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45781/">CVE-2024-45781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45781">CVE-2024-45781 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45783/">CVE-2024-45783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45783">CVE-2024-45783 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0622/">CVE-2025-0622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0622">CVE-2025-0622 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0677/">CVE-2025-0677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0677">CVE-2025-0677 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0690/">CVE-2025-0690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0690">CVE-2025-0690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009984827" comment="grub2-common-2.06-104.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984828" comment="grub2-efi-x64-2.06-104.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984829" comment="grub2-efi-x64-cdboot-2.06-104.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984830" comment="grub2-efi-x64-modules-2.06-104.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984831" comment="grub2-pc-2.06-104.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984832" comment="grub2-pc-modules-2.06-104.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984833" comment="grub2-tools-2.06-104.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984834" comment="grub2-tools-efi-2.06-104.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984835" comment="grub2-tools-extra-2.06-104.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984836" comment="grub2-tools-minimal-2.06-104.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4745" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-26465" ref_url="https://www.suse.com/security/cve/CVE-2025-26465/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:6993.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:6993.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-26465/">CVE-2025-26465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26465">CVE-2025-26465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983864" comment="openssh-8.7p1-45.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983865" comment="openssh-askpass-8.7p1-45.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983866" comment="openssh-clients-8.7p1-45.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983867" comment="openssh-keycat-8.7p1-45.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983868" comment="openssh-server-8.7p1-45.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983869" comment="pam_ssh_agent_auth-0.10.4-5.45.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4746" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-28047" ref_url="https://www.suse.com/security/cve/CVE-2024-28047/" source="CVE"/>
		<reference ref_id="CVE-2024-31157" ref_url="https://www.suse.com/security/cve/CVE-2024-31157/" source="CVE"/>
		<reference ref_id="CVE-2024-39279" ref_url="https://www.suse.com/security/cve/CVE-2024-39279/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7043.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7043.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28047/">CVE-2024-28047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28047">CVE-2024-28047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31157/">CVE-2024-31157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31157">CVE-2024-31157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39279/">CVE-2024-39279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39279">CVE-2024-39279 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984837" comment="microcode_ctl-20250211-1.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4747" version="1" class="patch">
	<metadata>
		<title>security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-35195" ref_url="https://www.suse.com/security/cve/CVE-2024-35195/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7049.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7049.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-35195/">CVE-2024-35195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35195">CVE-2024-35195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983870" comment="python3-requests-2.25.1-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983871" comment="python3-requests+security-2.25.1-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983872" comment="python3-requests+socks-2.25.1-9.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4748" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-12087" ref_url="https://www.suse.com/security/cve/CVE-2024-12087/" source="CVE"/>
		<reference ref_id="CVE-2024-12088" ref_url="https://www.suse.com/security/cve/CVE-2024-12088/" source="CVE"/>
		<reference ref_id="CVE-2024-12747" ref_url="https://www.suse.com/security/cve/CVE-2024-12747/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7050.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7050.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12087/">CVE-2024-12087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12087">CVE-2024-12087 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12088/">CVE-2024-12088 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12088">CVE-2024-12088 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12747/">CVE-2024-12747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12747">CVE-2024-12747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983873" comment="rsync-3.2.5-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983874" comment="rsync-daemon-3.2.5-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983875" comment="rsync-rrsync-3.2.5-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4749" version="1" class="patch">
	<metadata>
		<title>security update for iptraf-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-52949" ref_url="https://www.suse.com/security/cve/CVE-2024-52949/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7064.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7064.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52949/">CVE-2024-52949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52949">CVE-2024-52949 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984838" comment="iptraf-ng-1.2.2-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4750" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-24528" ref_url="https://www.suse.com/security/cve/CVE-2025-24528/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7067.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7067.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24528/">CVE-2025-24528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">CVE-2025-24528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983876" comment="krb5-devel-1.21.1-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983877" comment="krb5-libs-1.21.1-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983878" comment="krb5-pkinit-1.21.1-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983879" comment="krb5-server-1.21.1-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983880" comment="krb5-server-ldap-1.21.1-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983881" comment="krb5-workstation-1.21.1-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983882" comment="libkadm5-1.21.1-6.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4751" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-12243" ref_url="https://www.suse.com/security/cve/CVE-2024-12243/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7076.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7076.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12243/">CVE-2024-12243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12243">CVE-2024-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985323" comment="gnutls-3.8.3-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985324" comment="gnutls-c++-3.8.3-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985325" comment="gnutls-dane-3.8.3-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985326" comment="gnutls-devel-3.8.3-6.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985327" comment="gnutls-utils-3.8.3-6.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4752" version="1" class="patch">
	<metadata>
		<title>security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-12133" ref_url="https://www.suse.com/security/cve/CVE-2024-12133/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7077.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7077.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12133/">CVE-2024-12133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12133">CVE-2024-12133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985328" comment="libtasn1-4.16.0-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985329" comment="libtasn1-devel-4.16.0-9.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985330" comment="libtasn1-tools-4.16.0-9.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4753" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-8418" ref_url="https://www.suse.com/security/cve/CVE-2024-8418/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7094.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7094.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8418/">CVE-2024-8418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8418">CVE-2024-8418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983883" comment="aardvark-dns-1.14.0-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4754" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7107.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7107.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983884" comment="python3.12-3.12.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983885" comment="python3.12-debug-3.12.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983886" comment="python3.12-devel-3.12.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983887" comment="python3.12-idle-3.12.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983888" comment="python3.12-libs-3.12.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983889" comment="python3.12-test-3.12.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983890" comment="python3.12-tkinter-3.12.9-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4755" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7109.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7109.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983891" comment="python3.11-3.11.11-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983892" comment="python3.11-debug-3.11.11-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983893" comment="python3.11-devel-3.11.11-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983894" comment="python3.11-idle-3.11.11-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983895" comment="python3.11-libs-3.11.11-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983896" comment="python3.11-test-3.11.11-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983897" comment="python3.11-tkinter-3.11.11-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4756" version="1" class="patch">
	<metadata>
		<title>security update for protobuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-1941" ref_url="https://www.suse.com/security/cve/CVE-2022-1941/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7138.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7138.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1941/">CVE-2022-1941 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1941">CVE-2022-1941 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985331" comment="protobuf-3.14.0-16.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985332" comment="protobuf-compiler-3.14.0-16.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985333" comment="protobuf-devel-3.14.0-16.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985334" comment="protobuf-lite-3.14.0-16.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985335" comment="protobuf-lite-devel-3.14.0-16.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985336" comment="python3-protobuf-3.14.0-16.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4757" version="1" class="patch">
	<metadata>
		<title>security update for rpm-ostree (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-24898" ref_url="https://www.suse.com/security/cve/CVE-2025-24898/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7147.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7147.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24898/">CVE-2025-24898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24898">CVE-2025-24898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983898" comment="rpm-ostree-2025.5-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983899" comment="rpm-ostree-libs-2025.5-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4758" version="1" class="patch">
	<metadata>
		<title>security update for bootc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-24898" ref_url="https://www.suse.com/security/cve/CVE-2025-24898/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7160.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7160.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24898/">CVE-2025-24898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24898">CVE-2025-24898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983900" comment="bootc-1.1.6-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983901" comment="system-reinstall-bootc-1.1.6-3.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4759" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-9632" ref_url="https://www.suse.com/security/cve/CVE-2024-9632/" source="CVE"/>
		<reference ref_id="CVE-2025-26594" ref_url="https://www.suse.com/security/cve/CVE-2025-26594/" source="CVE"/>
		<reference ref_id="CVE-2025-26595" ref_url="https://www.suse.com/security/cve/CVE-2025-26595/" source="CVE"/>
		<reference ref_id="CVE-2025-26596" ref_url="https://www.suse.com/security/cve/CVE-2025-26596/" source="CVE"/>
		<reference ref_id="CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597/" source="CVE"/>
		<reference ref_id="CVE-2025-26598" ref_url="https://www.suse.com/security/cve/CVE-2025-26598/" source="CVE"/>
		<reference ref_id="CVE-2025-26599" ref_url="https://www.suse.com/security/cve/CVE-2025-26599/" source="CVE"/>
		<reference ref_id="CVE-2025-26600" ref_url="https://www.suse.com/security/cve/CVE-2025-26600/" source="CVE"/>
		<reference ref_id="CVE-2025-26601" ref_url="https://www.suse.com/security/cve/CVE-2025-26601/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7163.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7163.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9632/">CVE-2024-9632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9632">CVE-2024-9632 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-26594/">CVE-2025-26594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26594">CVE-2025-26594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26595/">CVE-2025-26595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26595">CVE-2025-26595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26596/">CVE-2025-26596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26596">CVE-2025-26596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26598/">CVE-2025-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26598">CVE-2025-26598 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26599/">CVE-2025-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26599">CVE-2025-26599 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26600/">CVE-2025-26600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26600">CVE-2025-26600 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26601/">CVE-2025-26601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26601">CVE-2025-26601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983902" comment="xorg-x11-server-Xdmx-1.20.11-28.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983903" comment="xorg-x11-server-Xephyr-1.20.11-28.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983904" comment="xorg-x11-server-Xnest-1.20.11-28.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983905" comment="xorg-x11-server-Xorg-1.20.11-28.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983906" comment="xorg-x11-server-Xvfb-1.20.11-28.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983907" comment="xorg-x11-server-common-1.20.11-28.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983908" comment="xorg-x11-server-devel-1.20.11-28.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983909" comment="xorg-x11-server-source-1.20.11-28.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4760" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server-Xwayland (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-9632" ref_url="https://www.suse.com/security/cve/CVE-2024-9632/" source="CVE"/>
		<reference ref_id="CVE-2025-26594" ref_url="https://www.suse.com/security/cve/CVE-2025-26594/" source="CVE"/>
		<reference ref_id="CVE-2025-26595" ref_url="https://www.suse.com/security/cve/CVE-2025-26595/" source="CVE"/>
		<reference ref_id="CVE-2025-26596" ref_url="https://www.suse.com/security/cve/CVE-2025-26596/" source="CVE"/>
		<reference ref_id="CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597/" source="CVE"/>
		<reference ref_id="CVE-2025-26598" ref_url="https://www.suse.com/security/cve/CVE-2025-26598/" source="CVE"/>
		<reference ref_id="CVE-2025-26599" ref_url="https://www.suse.com/security/cve/CVE-2025-26599/" source="CVE"/>
		<reference ref_id="CVE-2025-26600" ref_url="https://www.suse.com/security/cve/CVE-2025-26600/" source="CVE"/>
		<reference ref_id="CVE-2025-26601" ref_url="https://www.suse.com/security/cve/CVE-2025-26601/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7165.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7165.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9632/">CVE-2024-9632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9632">CVE-2024-9632 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-26594/">CVE-2025-26594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26594">CVE-2025-26594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26595/">CVE-2025-26595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26595">CVE-2025-26595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26596/">CVE-2025-26596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26596">CVE-2025-26596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26598/">CVE-2025-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26598">CVE-2025-26598 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26599/">CVE-2025-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26599">CVE-2025-26599 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26600/">CVE-2025-26600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26600">CVE-2025-26600 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26601/">CVE-2025-26601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26601">CVE-2025-26601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983910" comment="xorg-x11-server-Xwayland-23.2.7-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983911" comment="xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4761" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-0444" ref_url="https://www.suse.com/security/cve/CVE-2024-0444/" source="CVE"/>
		<reference ref_id="CVE-2024-4453" ref_url="https://www.suse.com/security/cve/CVE-2024-4453/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7178.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7178.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0444/">CVE-2024-0444 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0444">CVE-2024-0444 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4453/">CVE-2024-4453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4453">CVE-2024-4453 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985811" comment="gstreamer1-1.22.12-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985812" comment="gstreamer1-devel-1.22.12-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985813" comment="gstreamer1-plugins-bad-free-1.22.12-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985814" comment="gstreamer1-plugins-bad-free-devel-1.22.12-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985815" comment="gstreamer1-plugins-bad-free-libs-1.22.12-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985816" comment="gstreamer1-plugins-ugly-free-1.22.12-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985817" comment="gstreamer1-rtsp-server-1.22.12-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4762" version="1" class="patch">
	<metadata>
		<title>security update for corosync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-30472" ref_url="https://www.suse.com/security/cve/CVE-2025-30472/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7201.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7201.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" cvss4="9.5/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-30472/">CVE-2025-30472 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30472">CVE-2025-30472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985337" comment="corosync-3.1.9-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985338" comment="corosync-vqsim-3.1.9-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985339" comment="corosynclib-3.1.9-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985340" comment="corosynclib-devel-3.1.9-2.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4763" version="1" class="patch">
	<metadata>
		<title>security update for rust-bootupd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-24898" ref_url="https://www.suse.com/security/cve/CVE-2025-24898/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7241.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7241.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24898/">CVE-2025-24898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24898">CVE-2025-24898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985341" comment="bootupd-0.2.27-3.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4764" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-good (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-47543" ref_url="https://www.suse.com/security/cve/CVE-2024-47543/" source="CVE"/>
		<reference ref_id="CVE-2024-47544" ref_url="https://www.suse.com/security/cve/CVE-2024-47544/" source="CVE"/>
		<reference ref_id="CVE-2024-47545" ref_url="https://www.suse.com/security/cve/CVE-2024-47545/" source="CVE"/>
		<reference ref_id="CVE-2024-47546" ref_url="https://www.suse.com/security/cve/CVE-2024-47546/" source="CVE"/>
		<reference ref_id="CVE-2024-47596" ref_url="https://www.suse.com/security/cve/CVE-2024-47596/" source="CVE"/>
		<reference ref_id="CVE-2024-47597" ref_url="https://www.suse.com/security/cve/CVE-2024-47597/" source="CVE"/>
		<reference ref_id="CVE-2024-47598" ref_url="https://www.suse.com/security/cve/CVE-2024-47598/" source="CVE"/>
		<reference ref_id="CVE-2024-47599" ref_url="https://www.suse.com/security/cve/CVE-2024-47599/" source="CVE"/>
		<reference ref_id="CVE-2024-47601" ref_url="https://www.suse.com/security/cve/CVE-2024-47601/" source="CVE"/>
		<reference ref_id="CVE-2024-47602" ref_url="https://www.suse.com/security/cve/CVE-2024-47602/" source="CVE"/>
		<reference ref_id="CVE-2024-47603" ref_url="https://www.suse.com/security/cve/CVE-2024-47603/" source="CVE"/>
		<reference ref_id="CVE-2024-47774" ref_url="https://www.suse.com/security/cve/CVE-2024-47774/" source="CVE"/>
		<reference ref_id="CVE-2024-47775" ref_url="https://www.suse.com/security/cve/CVE-2024-47775/" source="CVE"/>
		<reference ref_id="CVE-2024-47776" ref_url="https://www.suse.com/security/cve/CVE-2024-47776/" source="CVE"/>
		<reference ref_id="CVE-2024-47777" ref_url="https://www.suse.com/security/cve/CVE-2024-47777/" source="CVE"/>
		<reference ref_id="CVE-2024-47778" ref_url="https://www.suse.com/security/cve/CVE-2024-47778/" source="CVE"/>
		<reference ref_id="CVE-2024-47834" ref_url="https://www.suse.com/security/cve/CVE-2024-47834/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7242.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7242.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47543/">CVE-2024-47543 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47543">CVE-2024-47543 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47544/">CVE-2024-47544 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47544">CVE-2024-47544 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47545/">CVE-2024-47545 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47545">CVE-2024-47545 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47546/">CVE-2024-47546 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47546">CVE-2024-47546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47596/">CVE-2024-47596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47596">CVE-2024-47596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47597/">CVE-2024-47597 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47597">CVE-2024-47597 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47598/">CVE-2024-47598 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47598">CVE-2024-47598 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47599/">CVE-2024-47599 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47599">CVE-2024-47599 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47601/">CVE-2024-47601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47601">CVE-2024-47601 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47602/">CVE-2024-47602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47602">CVE-2024-47602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47603/">CVE-2024-47603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47603">CVE-2024-47603 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47774/">CVE-2024-47774 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47774">CVE-2024-47774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47775/">CVE-2024-47775 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47775">CVE-2024-47775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47776/">CVE-2024-47776 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47776">CVE-2024-47776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47777/">CVE-2024-47777 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47777">CVE-2024-47777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47778/">CVE-2024-47778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47778">CVE-2024-47778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47834/">CVE-2024-47834 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47834">CVE-2024-47834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4765" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-47541" ref_url="https://www.suse.com/security/cve/CVE-2024-47541/" source="CVE"/>
		<reference ref_id="CVE-2024-47542" ref_url="https://www.suse.com/security/cve/CVE-2024-47542/" source="CVE"/>
		<reference ref_id="CVE-2024-47600" ref_url="https://www.suse.com/security/cve/CVE-2024-47600/" source="CVE"/>
		<reference ref_id="CVE-2024-47835" ref_url="https://www.suse.com/security/cve/CVE-2024-47835/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7243.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7243.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-47541/">CVE-2024-47541 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47541">CVE-2024-47541 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47542/">CVE-2024-47542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47542">CVE-2024-47542 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47600/">CVE-2024-47600 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47600">CVE-2024-47600 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47835/">CVE-2024-47835 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47835">CVE-2024-47835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983912" comment="gstreamer1-plugins-base-1.22.12-4.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983913" comment="gstreamer1-plugins-base-devel-1.22.12-4.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983914" comment="gstreamer1-plugins-base-tools-1.22.12-4.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4766" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-39321" ref_url="https://www.suse.com/security/cve/CVE-2023-39321/" source="CVE"/>
		<reference ref_id="CVE-2023-39322" ref_url="https://www.suse.com/security/cve/CVE-2023-39322/" source="CVE"/>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<reference ref_id="CVE-2024-9355" ref_url="https://www.suse.com/security/cve/CVE-2024-9355/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7256.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7256.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39321/">CVE-2023-39321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39322/">CVE-2023-39322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9355/">CVE-2024-9355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9355">CVE-2024-9355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983915" comment="git-lfs-3.6.1-1.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4767" version="1" class="patch">
	<metadata>
		<title>security update for openjpeg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-56826" ref_url="https://www.suse.com/security/cve/CVE-2024-56826/" source="CVE"/>
		<reference ref_id="CVE-2024-56827" ref_url="https://www.suse.com/security/cve/CVE-2024-56827/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7309.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7309.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56826/">CVE-2024-56826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56826">CVE-2024-56826 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56827/">CVE-2024-56827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56827">CVE-2024-56827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983916" comment="openjpeg2-2.4.0-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983917" comment="openjpeg2-devel-2.4.0-8.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983918" comment="openjpeg2-tools-2.4.0-8.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4768" version="1" class="patch">
	<metadata>
		<title>security update for keylime-agent-rust (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-24898" ref_url="https://www.suse.com/security/cve/CVE-2025-24898/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7313.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7313.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24898/">CVE-2025-24898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24898">CVE-2025-24898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983919" comment="keylime-agent-rust-0.2.2-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4769" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-11233" ref_url="https://www.suse.com/security/cve/CVE-2024-11233/" source="CVE"/>
		<reference ref_id="CVE-2024-11234" ref_url="https://www.suse.com/security/cve/CVE-2024-11234/" source="CVE"/>
		<reference ref_id="CVE-2024-2756" ref_url="https://www.suse.com/security/cve/CVE-2024-2756/" source="CVE"/>
		<reference ref_id="CVE-2024-3096" ref_url="https://www.suse.com/security/cve/CVE-2024-3096/" source="CVE"/>
		<reference ref_id="CVE-2024-5458" ref_url="https://www.suse.com/security/cve/CVE-2024-5458/" source="CVE"/>
		<reference ref_id="CVE-2024-8925" ref_url="https://www.suse.com/security/cve/CVE-2024-8925/" source="CVE"/>
		<reference ref_id="CVE-2024-8927" ref_url="https://www.suse.com/security/cve/CVE-2024-8927/" source="CVE"/>
		<reference ref_id="CVE-2024-8929" ref_url="https://www.suse.com/security/cve/CVE-2024-8929/" source="CVE"/>
		<reference ref_id="CVE-2024-9026" ref_url="https://www.suse.com/security/cve/CVE-2024-9026/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7315.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7315.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11233/">CVE-2024-11233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11233">CVE-2024-11233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11234/">CVE-2024-11234 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11234">CVE-2024-11234 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2756/">CVE-2024-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2756">CVE-2024-2756 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3096/">CVE-2024-3096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3096">CVE-2024-3096 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-5458/">CVE-2024-5458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5458">CVE-2024-5458 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8925/">CVE-2024-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8925">CVE-2024-8925 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8927/">CVE-2024-8927 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8927">CVE-2024-8927 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8929/">CVE-2024-8929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8929">CVE-2024-8929 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9026/">CVE-2024-9026 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9026">CVE-2024-9026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985342" comment="php-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985343" comment="php-bcmath-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985344" comment="php-cli-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985345" comment="php-common-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985346" comment="php-dba-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985347" comment="php-dbg-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985348" comment="php-devel-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985349" comment="php-embedded-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985350" comment="php-enchant-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985351" comment="php-ffi-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985352" comment="php-fpm-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985353" comment="php-gd-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985354" comment="php-gmp-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985355" comment="php-intl-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985356" comment="php-ldap-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985357" comment="php-mbstring-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985358" comment="php-mysqlnd-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985359" comment="php-odbc-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985360" comment="php-opcache-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985361" comment="php-pdo-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985362" comment="php-pgsql-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985363" comment="php-process-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985364" comment="php-snmp-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985365" comment="php-soap-8.0.30-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985366" comment="php-xml-8.0.30-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4770" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-24898" ref_url="https://www.suse.com/security/cve/CVE-2025-24898/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7317.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7317.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24898/">CVE-2025-24898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24898">CVE-2025-24898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985367" comment="python3.12-cryptography-41.0.7-2.el9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4771" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-23419" ref_url="https://www.suse.com/security/cve/CVE-2025-23419/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7331.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7331.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-23419/">CVE-2025-23419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23419">CVE-2025-23419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985368" comment="nginx-1.20.1-22.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985369" comment="nginx-all-modules-1.20.1-22.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985370" comment="nginx-core-1.20.1-22.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985371" comment="nginx-filesystem-1.20.1-22.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985372" comment="nginx-mod-devel-1.20.1-22.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985373" comment="nginx-mod-http-image-filter-1.20.1-22.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985374" comment="nginx-mod-http-perl-1.20.1-22.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985375" comment="nginx-mod-http-xslt-filter-1.20.1-22.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985376" comment="nginx-mod-mail-1.20.1-22.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985377" comment="nginx-mod-stream-1.20.1-22.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4772" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-44192" ref_url="https://www.suse.com/security/cve/CVE-2024-44192/" source="CVE"/>
		<reference ref_id="CVE-2024-54467" ref_url="https://www.suse.com/security/cve/CVE-2024-54467/" source="CVE"/>
		<reference ref_id="CVE-2024-54551" ref_url="https://www.suse.com/security/cve/CVE-2024-54551/" source="CVE"/>
		<reference ref_id="CVE-2025-24208" ref_url="https://www.suse.com/security/cve/CVE-2025-24208/" source="CVE"/>
		<reference ref_id="CVE-2025-24209" ref_url="https://www.suse.com/security/cve/CVE-2025-24209/" source="CVE"/>
		<reference ref_id="CVE-2025-24216" ref_url="https://www.suse.com/security/cve/CVE-2025-24216/" source="CVE"/>
		<reference ref_id="CVE-2025-30427" ref_url="https://www.suse.com/security/cve/CVE-2025-30427/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7387.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7387.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44192/">CVE-2024-44192 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44192">CVE-2024-44192 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54467/">CVE-2024-54467 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54467">CVE-2024-54467 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54551/">CVE-2024-54551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54551">CVE-2024-54551 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24208/">CVE-2025-24208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24208">CVE-2025-24208 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24209/">CVE-2025-24209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24209">CVE-2025-24209 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24216/">CVE-2025-24216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24216">CVE-2025-24216 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30427/">CVE-2025-30427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30427">CVE-2025-30427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983920" comment="webkit2gtk3-2.48.1-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983921" comment="webkit2gtk3-devel-2.48.1-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983922" comment="webkit2gtk3-jsc-2.48.1-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983923" comment="webkit2gtk3-jsc-devel-2.48.1-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4773" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7389.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7389.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985565" comment="buildah-1.39.4-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985566" comment="buildah-tests-1.39.4-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4774" version="1" class="patch">
	<metadata>
		<title>security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7391.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7391.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983924" comment="podman-5.4.0-9.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983925" comment="podman-docker-5.4.0-9.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983926" comment="podman-plugins-5.4.0-9.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983927" comment="podman-remote-5.4.0-9.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983928" comment="podman-tests-5.4.0-9.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4775" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-2487" ref_url="https://www.suse.com/security/cve/CVE-2025-2487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7395.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7395.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2487/">CVE-2025-2487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2487">CVE-2025-2487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983929" comment="389-ds-base-2.6.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983930" comment="389-ds-base-devel-2.6.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983931" comment="389-ds-base-libs-2.6.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983932" comment="389-ds-base-snmp-2.6.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983933" comment="python3-lib389-2.6.1-8.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4776" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7397.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7397.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985976" comment="skopeo-1.18.1-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985977" comment="skopeo-tests-1.18.1-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4777" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-41741" ref_url="https://www.suse.com/security/cve/CVE-2022-41741/" source="CVE"/>
		<reference ref_id="CVE-2022-41742" ref_url="https://www.suse.com/security/cve/CVE-2022-41742/" source="CVE"/>
		<reference ref_id="CVE-2024-7347" ref_url="https://www.suse.com/security/cve/CVE-2024-7347/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7402.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7402.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41741/">CVE-2022-41741 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41741">CVE-2022-41741 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41742/">CVE-2022-41742 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41742">CVE-2022-41742 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7347/">CVE-2024-7347 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7347">CVE-2024-7347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983934" comment="nginx-1.20.1-22.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983935" comment="nginx-all-modules-1.20.1-22.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983936" comment="nginx-core-1.20.1-22.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983937" comment="nginx-filesystem-1.20.1-22.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983938" comment="nginx-mod-devel-1.20.1-22.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983939" comment="nginx-mod-http-image-filter-1.20.1-22.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983940" comment="nginx-mod-http-perl-1.20.1-22.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983941" comment="nginx-mod-http-xslt-filter-1.20.1-22.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983942" comment="nginx-mod-mail-1.20.1-22.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983943" comment="nginx-mod-stream-1.20.1-22.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4778" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7404.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7404.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985378" comment="grafana-10.2.6-11.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985379" comment="grafana-selinux-10.2.6-11.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4779" version="1" class="patch">
	<metadata>
		<title>security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-52005" ref_url="https://www.suse.com/security/cve/CVE-2024-52005/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7409.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7409.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-52005/">CVE-2024-52005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52005">CVE-2024-52005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983944" comment="git-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983945" comment="git-all-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983946" comment="git-core-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983947" comment="git-core-doc-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983948" comment="git-credential-libsecret-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983949" comment="git-daemon-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983950" comment="git-email-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983951" comment="git-gui-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983952" comment="git-instaweb-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983953" comment="git-subtree-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983954" comment="git-svn-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983955" comment="gitk-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983956" comment="gitweb-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983957" comment="perl-Git-2.47.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983958" comment="perl-Git-SVN-2.47.1-2.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4780" version="1" class="patch">
	<metadata>
		<title>security update for libxslt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-55549" ref_url="https://www.suse.com/security/cve/CVE-2024-55549/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7410.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7410.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-55549/">CVE-2024-55549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983959" comment="libxslt-1.1.34-13.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983960" comment="libxslt-devel-1.1.34-13.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4781" version="1" class="patch">
	<metadata>
		<title>security update for gvisor-tap-vsock (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7416.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7416.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985380" comment="gvisor-tap-vsock-0.8.5-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985381" comment="gvisor-tap-vsock-gvforwarder-0.8.5-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4782" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-44441" ref_url="https://www.suse.com/security/cve/CVE-2023-44441/" source="CVE"/>
		<reference ref_id="CVE-2023-44442" ref_url="https://www.suse.com/security/cve/CVE-2023-44442/" source="CVE"/>
		<reference ref_id="CVE-2023-44443" ref_url="https://www.suse.com/security/cve/CVE-2023-44443/" source="CVE"/>
		<reference ref_id="CVE-2023-44444" ref_url="https://www.suse.com/security/cve/CVE-2023-44444/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7417.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7417.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44441/">CVE-2023-44441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44441">CVE-2023-44441 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44442/">CVE-2023-44442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44442">CVE-2023-44442 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44443/">CVE-2023-44443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44443">CVE-2023-44443 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-44444/">CVE-2023-44444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44444">CVE-2023-44444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983961" comment="gimp-2.99.8-4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983962" comment="gimp-libs-2.99.8-4.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4783" version="1" class="patch">
	<metadata>
		<title>security update for php (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-11235" ref_url="https://www.suse.com/security/cve/CVE-2024-11235/" source="CVE"/>
		<reference ref_id="CVE-2025-1217" ref_url="https://www.suse.com/security/cve/CVE-2025-1217/" source="CVE"/>
		<reference ref_id="CVE-2025-1219" ref_url="https://www.suse.com/security/cve/CVE-2025-1219/" source="CVE"/>
		<reference ref_id="CVE-2025-1734" ref_url="https://www.suse.com/security/cve/CVE-2025-1734/" source="CVE"/>
		<reference ref_id="CVE-2025-1736" ref_url="https://www.suse.com/security/cve/CVE-2025-1736/" source="CVE"/>
		<reference ref_id="CVE-2025-1861" ref_url="https://www.suse.com/security/cve/CVE-2025-1861/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7418.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7418.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11235/">CVE-2024-11235 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11235">CVE-2024-11235 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1217/">CVE-2025-1217 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1217">CVE-2025-1217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1219/">CVE-2025-1219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1219">CVE-2025-1219 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1734/">CVE-2025-1734 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1734">CVE-2025-1734 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1736/">CVE-2025-1736 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1736">CVE-2025-1736 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1861/">CVE-2025-1861 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1861">CVE-2025-1861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985383" comment="php-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985384" comment="php-bcmath-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985385" comment="php-cli-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985386" comment="php-common-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985387" comment="php-dba-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985388" comment="php-dbg-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985389" comment="php-devel-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985390" comment="php-embedded-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985391" comment="php-enchant-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985392" comment="php-ffi-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985393" comment="php-fpm-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985394" comment="php-gd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985395" comment="php-gmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985396" comment="php-intl-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985397" comment="php-ldap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985398" comment="php-mbstring-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985399" comment="php-mysqlnd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985400" comment="php-odbc-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985401" comment="php-opcache-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985402" comment="php-pdo-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985409" comment="php-pgsql-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985410" comment="php-process-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985411" comment="php-snmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985412" comment="php-soap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985413" comment="php-xml-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4784" version="1" class="patch">
	<metadata>
		<title>security update for mod_auth_openidc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-31492" ref_url="https://www.suse.com/security/cve/CVE-2025-31492/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7419.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7419.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31492/">CVE-2025-31492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31492">CVE-2025-31492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983963" comment="mod_auth_openidc-2.4.10-1.el9_6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4785" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-46751" ref_url="https://www.suse.com/security/cve/CVE-2023-46751/" source="CVE"/>
		<reference ref_id="CVE-2024-46951" ref_url="https://www.suse.com/security/cve/CVE-2024-46951/" source="CVE"/>
		<reference ref_id="CVE-2024-46952" ref_url="https://www.suse.com/security/cve/CVE-2024-46952/" source="CVE"/>
		<reference ref_id="CVE-2024-46953" ref_url="https://www.suse.com/security/cve/CVE-2024-46953/" source="CVE"/>
		<reference ref_id="CVE-2024-46954" ref_url="https://www.suse.com/security/cve/CVE-2024-46954/" source="CVE"/>
		<reference ref_id="CVE-2024-46956" ref_url="https://www.suse.com/security/cve/CVE-2024-46956/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7422.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7422.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46751/">CVE-2023-46751 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46751">CVE-2023-46751 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46951/">CVE-2024-46951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46951">CVE-2024-46951 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46952/">CVE-2024-46952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46952">CVE-2024-46952 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46953/">CVE-2024-46953 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46953">CVE-2024-46953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46954/">CVE-2024-46954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46954">CVE-2024-46954 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46956/">CVE-2024-46956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46956">CVE-2024-46956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983964" comment="ghostscript-9.54.0-18.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983965" comment="ghostscript-doc-9.54.0-18.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983966" comment="ghostscript-tools-dvipdf-9.54.0-18.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983967" comment="ghostscript-tools-fonts-9.54.0-18.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983968" comment="ghostscript-tools-printing-9.54.0-18.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983969" comment="ghostscript-x11-9.54.0-18.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983970" comment="libgs-9.54.0-18.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983971" comment="libgs-devel-9.54.0-18.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4786" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-58005" ref_url="https://www.suse.com/security/cve/CVE-2024-58005/" source="CVE"/>
		<reference ref_id="CVE-2024-58007" ref_url="https://www.suse.com/security/cve/CVE-2024-58007/" source="CVE"/>
		<reference ref_id="CVE-2024-58069" ref_url="https://www.suse.com/security/cve/CVE-2024-58069/" source="CVE"/>
		<reference ref_id="CVE-2025-21633" ref_url="https://www.suse.com/security/cve/CVE-2025-21633/" source="CVE"/>
		<reference ref_id="CVE-2025-21927" ref_url="https://www.suse.com/security/cve/CVE-2025-21927/" source="CVE"/>
		<reference ref_id="CVE-2025-21993" ref_url="https://www.suse.com/security/cve/CVE-2025-21993/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7423.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7423.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58005/">CVE-2024-58005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58005">CVE-2024-58005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58007/">CVE-2024-58007 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58007">CVE-2024-58007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58069/">CVE-2024-58069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58069">CVE-2024-58069 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21633/">CVE-2025-21633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21633">CVE-2025-21633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21927/">CVE-2025-21927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21927">CVE-2025-21927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21993/">CVE-2025-21993 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21993">CVE-2025-21993 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985567" comment="kernel-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985568" comment="kernel-abi-stablelists-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985569" comment="kernel-core-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985570" comment="kernel-cross-headers-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985571" comment="kernel-debug-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985572" comment="kernel-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985575" comment="kernel-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985576" comment="kernel-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985577" comment="kernel-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985578" comment="kernel-debug-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985581" comment="kernel-doc-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985582" comment="kernel-headers-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985583" comment="kernel-modules-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985584" comment="kernel-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985585" comment="kernel-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985586" comment="kernel-rt-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985587" comment="kernel-rt-core-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985588" comment="kernel-rt-debug-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985589" comment="kernel-rt-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985591" comment="kernel-rt-debug-kvm-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985592" comment="kernel-rt-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985593" comment="kernel-rt-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985594" comment="kernel-rt-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985596" comment="kernel-rt-kvm-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985597" comment="kernel-rt-modules-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985598" comment="kernel-rt-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985599" comment="kernel-rt-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985600" comment="kernel-tools-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985601" comment="kernel-tools-libs-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985603" comment="kernel-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985604" comment="kernel-uki-virt-addons-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985605" comment="libperf-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985606" comment="perf-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985607" comment="python3-perf-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985608" comment="rtla-5.14.0-570.16.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985609" comment="rv-5.14.0-570.16.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4787" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-31498" ref_url="https://www.suse.com/security/cve/CVE-2025-31498/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7426.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7426.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31498/">CVE-2025-31498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31498">CVE-2025-31498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985414" comment="nodejs-20.19.1-1.module+el9.6.0+23053+4195b0b2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985415" comment="nodejs-devel-20.19.1-1.module+el9.6.0+23053+4195b0b2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985416" comment="nodejs-docs-20.19.1-1.module+el9.6.0+23053+4195b0b2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985417" comment="nodejs-full-i18n-20.19.1-1.module+el9.6.0+23053+4195b0b2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985418" comment="npm-10.8.2-1.20.19.1.1.module+el9.6.0+23053+4195b0b2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4788" version="1" class="patch">
	<metadata>
		<title>security update for xterm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-45063" ref_url="https://www.suse.com/security/cve/CVE-2022-45063/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7427.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7427.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45063/">CVE-2022-45063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45063">CVE-2022-45063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983972" comment="xterm-366-10.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983973" comment="xterm-resize-366-10.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4789" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-2817" ref_url="https://www.suse.com/security/cve/CVE-2025-2817/" source="CVE"/>
		<reference ref_id="CVE-2025-4083" ref_url="https://www.suse.com/security/cve/CVE-2025-4083/" source="CVE"/>
		<reference ref_id="CVE-2025-4087" ref_url="https://www.suse.com/security/cve/CVE-2025-4087/" source="CVE"/>
		<reference ref_id="CVE-2025-4091" ref_url="https://www.suse.com/security/cve/CVE-2025-4091/" source="CVE"/>
		<reference ref_id="CVE-2025-4093" ref_url="https://www.suse.com/security/cve/CVE-2025-4093/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7428.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7428.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2817/">CVE-2025-2817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2817">CVE-2025-2817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4083/">CVE-2025-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4083">CVE-2025-4083 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4087/">CVE-2025-4087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4087">CVE-2025-4087 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4091/">CVE-2025-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4091">CVE-2025-4091 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4093/">CVE-2025-4093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4093">CVE-2025-4093 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983974" comment="firefox-128.10.0-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983975" comment="firefox-x11-128.10.0-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4790" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21605" ref_url="https://www.suse.com/security/cve/CVE-2025-21605/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7429.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7429.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21605/">CVE-2025-21605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21605">CVE-2025-21605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983976" comment="redis-7.2.8-1.module+el9.6.0+23049+8374f320 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983977" comment="redis-devel-7.2.8-1.module+el9.6.0+23049+8374f320 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983978" comment="redis-doc-7.2.8-1.module+el9.6.0+23049+8374f320 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4791" version="1" class="patch">
	<metadata>
		<title>security update for yelp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-3155" ref_url="https://www.suse.com/security/cve/CVE-2025-3155/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7430.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7430.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3155/">CVE-2025-3155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3155">CVE-2025-3155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983979" comment="yelp-40.3-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983980" comment="yelp-devel-40.3-2.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983981" comment="yelp-libs-40.3-2.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4792" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-1217" ref_url="https://www.suse.com/security/cve/CVE-2025-1217/" source="CVE"/>
		<reference ref_id="CVE-2025-1219" ref_url="https://www.suse.com/security/cve/CVE-2025-1219/" source="CVE"/>
		<reference ref_id="CVE-2025-1734" ref_url="https://www.suse.com/security/cve/CVE-2025-1734/" source="CVE"/>
		<reference ref_id="CVE-2025-1736" ref_url="https://www.suse.com/security/cve/CVE-2025-1736/" source="CVE"/>
		<reference ref_id="CVE-2025-1861" ref_url="https://www.suse.com/security/cve/CVE-2025-1861/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7431.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7431.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1217/">CVE-2025-1217 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1217">CVE-2025-1217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1219/">CVE-2025-1219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1219">CVE-2025-1219 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1734/">CVE-2025-1734 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1734">CVE-2025-1734 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1736/">CVE-2025-1736 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1736">CVE-2025-1736 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1861/">CVE-2025-1861 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1861">CVE-2025-1861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983982" comment="php-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983983" comment="php-bcmath-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983984" comment="php-cli-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983985" comment="php-common-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983986" comment="php-dba-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983987" comment="php-dbg-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983988" comment="php-devel-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983989" comment="php-embedded-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983990" comment="php-enchant-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983991" comment="php-ffi-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983992" comment="php-fpm-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983993" comment="php-gd-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983994" comment="php-gmp-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983995" comment="php-intl-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983996" comment="php-ldap-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983997" comment="php-mbstring-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983998" comment="php-mysqlnd-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983999" comment="php-odbc-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984000" comment="php-opcache-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984001" comment="php-pdo-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984002" comment="php-pgsql-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984003" comment="php-process-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984004" comment="php-snmp-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984005" comment="php-soap-8.0.30-3.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984006" comment="php-xml-8.0.30-3.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4793" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-11233" ref_url="https://www.suse.com/security/cve/CVE-2024-11233/" source="CVE"/>
		<reference ref_id="CVE-2024-11234" ref_url="https://www.suse.com/security/cve/CVE-2024-11234/" source="CVE"/>
		<reference ref_id="CVE-2024-8929" ref_url="https://www.suse.com/security/cve/CVE-2024-8929/" source="CVE"/>
		<reference ref_id="CVE-2025-1217" ref_url="https://www.suse.com/security/cve/CVE-2025-1217/" source="CVE"/>
		<reference ref_id="CVE-2025-1219" ref_url="https://www.suse.com/security/cve/CVE-2025-1219/" source="CVE"/>
		<reference ref_id="CVE-2025-1734" ref_url="https://www.suse.com/security/cve/CVE-2025-1734/" source="CVE"/>
		<reference ref_id="CVE-2025-1736" ref_url="https://www.suse.com/security/cve/CVE-2025-1736/" source="CVE"/>
		<reference ref_id="CVE-2025-1861" ref_url="https://www.suse.com/security/cve/CVE-2025-1861/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7432.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7432.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11233/">CVE-2024-11233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11233">CVE-2024-11233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11234/">CVE-2024-11234 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11234">CVE-2024-11234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8929/">CVE-2024-8929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8929">CVE-2024-8929 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1217/">CVE-2025-1217 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1217">CVE-2025-1217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1219/">CVE-2025-1219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1219">CVE-2025-1219 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1734/">CVE-2025-1734 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1734">CVE-2025-1734 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1736/">CVE-2025-1736 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1736">CVE-2025-1736 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1861/">CVE-2025-1861 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1861">CVE-2025-1861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957467" comment="apcu-panel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985419" comment="php-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985420" comment="php-bcmath-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985421" comment="php-cli-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985422" comment="php-common-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985423" comment="php-dba-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985424" comment="php-dbg-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985425" comment="php-devel-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985426" comment="php-embedded-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985427" comment="php-enchant-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985428" comment="php-ffi-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985429" comment="php-fpm-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985430" comment="php-gd-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985431" comment="php-gmp-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985432" comment="php-intl-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985433" comment="php-ldap-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985434" comment="php-mbstring-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985435" comment="php-mysqlnd-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985436" comment="php-odbc-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985437" comment="php-opcache-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985438" comment="php-pdo-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957488" comment="php-pecl-apcu-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957489" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957490" comment="php-pecl-rrd-2.0.3-4.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957491" comment="php-pecl-xdebug3-3.2.2-2.module+el9.4.0+20796+bd4564df is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957492" comment="php-pecl-zip-1.22.3-1.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985439" comment="php-pgsql-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985440" comment="php-process-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985441" comment="php-snmp-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985442" comment="php-soap-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985443" comment="php-xml-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4794" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-31498" ref_url="https://www.suse.com/security/cve/CVE-2025-31498/" source="CVE"/>
		<reference ref_id="CVE-2025-3277" ref_url="https://www.suse.com/security/cve/CVE-2025-3277/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7433.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7433.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31498/">CVE-2025-31498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31498">CVE-2025-31498 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3277/">CVE-2025-3277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3277">CVE-2025-3277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009984007" comment="nodejs-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984008" comment="nodejs-devel-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984009" comment="nodejs-docs-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984010" comment="nodejs-full-i18n-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984011" comment="nodejs-libs-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984012" comment="nodejs-nodemon-3.0.1-1.module+el9.6.0+23062+9e7801b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984013" comment="nodejs-packaging-2021.06-4.module+el9.6.0+23062+9e7801b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984014" comment="nodejs-packaging-bundler-2021.06-4.module+el9.6.0+23062+9e7801b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984015" comment="npm-10.9.2-1.22.15.0.1.module+el9.6.0+23062+9e7801b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984016" comment="v8-12.4-devel-12.4.254.21-1.22.15.0.1.module+el9.6.0+23062+9e7801b9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4795" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-2830" ref_url="https://www.suse.com/security/cve/CVE-2025-2830/" source="CVE"/>
		<reference ref_id="CVE-2025-3522" ref_url="https://www.suse.com/security/cve/CVE-2025-3522/" source="CVE"/>
		<reference ref_id="CVE-2025-3523" ref_url="https://www.suse.com/security/cve/CVE-2025-3523/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7435.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7435.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="4.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2830/">CVE-2025-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2830">CVE-2025-2830 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3522/">CVE-2025-3522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3522">CVE-2025-3522 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3523/">CVE-2025-3523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3523">CVE-2025-3523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984017" comment="thunderbird-128.10.0-1.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4796" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-32050" ref_url="https://www.suse.com/security/cve/CVE-2025-32050/" source="CVE"/>
		<reference ref_id="CVE-2025-32052" ref_url="https://www.suse.com/security/cve/CVE-2025-32052/" source="CVE"/>
		<reference ref_id="CVE-2025-32053" ref_url="https://www.suse.com/security/cve/CVE-2025-32053/" source="CVE"/>
		<reference ref_id="CVE-2025-32906" ref_url="https://www.suse.com/security/cve/CVE-2025-32906/" source="CVE"/>
		<reference ref_id="CVE-2025-32907" ref_url="https://www.suse.com/security/cve/CVE-2025-32907/" source="CVE"/>
		<reference ref_id="CVE-2025-32911" ref_url="https://www.suse.com/security/cve/CVE-2025-32911/" source="CVE"/>
		<reference ref_id="CVE-2025-32913" ref_url="https://www.suse.com/security/cve/CVE-2025-32913/" source="CVE"/>
		<reference ref_id="CVE-2025-46420" ref_url="https://www.suse.com/security/cve/CVE-2025-46420/" source="CVE"/>
		<reference ref_id="CVE-2025-46421" ref_url="https://www.suse.com/security/cve/CVE-2025-46421/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7436.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7436.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32050/">CVE-2025-32050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32050">CVE-2025-32050 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32052/">CVE-2025-32052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32052">CVE-2025-32052 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32053/">CVE-2025-32053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32053">CVE-2025-32053 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32906/">CVE-2025-32906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32906">CVE-2025-32906 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32907/">CVE-2025-32907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32907">CVE-2025-32907 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-32911/">CVE-2025-32911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32911">CVE-2025-32911 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32913/">CVE-2025-32913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32913">CVE-2025-32913 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46420/">CVE-2025-46420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46420">CVE-2025-46420 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46421/">CVE-2025-46421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46421">CVE-2025-46421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009984018" comment="libsoup-2.72.0-10.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984019" comment="libsoup-devel-2.72.0-10.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4797" version="1" class="patch">
	<metadata>
		<title>security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-52616" ref_url="https://www.suse.com/security/cve/CVE-2024-52616/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7437.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7437.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52616/">CVE-2024-52616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52616">CVE-2024-52616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009984020" comment="avahi-0.8-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984021" comment="avahi-autoipd-0.8-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984022" comment="avahi-compat-howl-0.8-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984023" comment="avahi-compat-howl-devel-0.8-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984024" comment="avahi-compat-libdns_sd-0.8-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984025" comment="avahi-compat-libdns_sd-devel-0.8-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984026" comment="avahi-devel-0.8-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984027" comment="avahi-glib-0.8-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984028" comment="avahi-glib-devel-0.8-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984029" comment="avahi-gobject-0.8-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984030" comment="avahi-gobject-devel-0.8-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984031" comment="avahi-libs-0.8-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984032" comment="avahi-tools-0.8-22.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4798" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21605" ref_url="https://www.suse.com/security/cve/CVE-2025-21605/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7438.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7438.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21605/">CVE-2025-21605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21605">CVE-2025-21605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009984033" comment="redis-6.2.18-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984034" comment="redis-devel-6.2.18-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984035" comment="redis-doc-6.2.18-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4799" version="1" class="patch">
	<metadata>
		<title>security update for vim (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-4752" ref_url="https://www.suse.com/security/cve/CVE-2023-4752/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7440.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7440.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4752/">CVE-2023-4752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4752">CVE-2023-4752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009984036" comment="vim-X11-8.2.2637-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984037" comment="vim-common-8.2.2637-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984038" comment="vim-enhanced-8.2.2637-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984039" comment="vim-filesystem-8.2.2637-22.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984040" comment="vim-minimal-8.2.2637-22.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4800" version="1" class="patch">
	<metadata>
		<title>security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-8176" ref_url="https://www.suse.com/security/cve/CVE-2024-8176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7444.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7444.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8176/">CVE-2024-8176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8176">CVE-2024-8176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009984041" comment="expat-2.5.0-5.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984042" comment="expat-devel-2.5.0-5.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4801" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-27832" ref_url="https://www.suse.com/security/cve/CVE-2025-27832/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7586.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7586.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27832/">CVE-2025-27832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27832">CVE-2025-27832 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985444" comment="ghostscript-9.54.0-19.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985445" comment="ghostscript-doc-9.54.0-19.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985446" comment="ghostscript-tools-dvipdf-9.54.0-19.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985447" comment="ghostscript-tools-fonts-9.54.0-19.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985448" comment="ghostscript-tools-printing-9.54.0-19.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985449" comment="ghostscript-x11-9.54.0-19.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985450" comment="libgs-9.54.0-19.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985451" comment="libgs-devel-9.54.0-19.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4802" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-26646" ref_url="https://www.suse.com/security/cve/CVE-2025-26646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7598.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7598.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-26646/">CVE-2025-26646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26646">CVE-2025-26646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009984043" comment="aspnetcore-runtime-8.0-8.0.16-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984044" comment="aspnetcore-runtime-dbg-8.0-8.0.16-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984045" comment="aspnetcore-targeting-pack-8.0-8.0.16-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984046" comment="dotnet-apphost-pack-8.0-8.0.16-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984047" comment="dotnet-hostfxr-8.0-8.0.16-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984048" comment="dotnet-runtime-8.0-8.0.16-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984049" comment="dotnet-runtime-dbg-8.0-8.0.16-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984050" comment="dotnet-sdk-8.0-8.0.116-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984051" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984052" comment="dotnet-sdk-dbg-8.0-8.0.116-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984053" comment="dotnet-targeting-pack-8.0-8.0.16-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984054" comment="dotnet-templates-8.0-8.0.116-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4803" version="1" class="patch">
	<metadata>
		<title>security update for dotnet9.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-26646" ref_url="https://www.suse.com/security/cve/CVE-2025-26646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7600.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7600.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-26646/">CVE-2025-26646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26646">CVE-2025-26646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985452" comment="aspnetcore-runtime-9.0-9.0.5-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985453" comment="aspnetcore-runtime-dbg-9.0-9.0.5-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985454" comment="aspnetcore-targeting-pack-9.0-9.0.5-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985455" comment="dotnet-apphost-pack-9.0-9.0.5-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985456" comment="dotnet-host-9.0.5-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985457" comment="dotnet-hostfxr-9.0-9.0.5-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985458" comment="dotnet-runtime-9.0-9.0.5-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985459" comment="dotnet-runtime-dbg-9.0-9.0.5-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985460" comment="dotnet-sdk-9.0-9.0.106-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985461" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985462" comment="dotnet-sdk-aot-9.0-9.0.106-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985463" comment="dotnet-sdk-dbg-9.0-9.0.106-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985464" comment="dotnet-targeting-pack-9.0-9.0.5-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985465" comment="dotnet-templates-9.0-9.0.106-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985466" comment="netstandard-targeting-pack-2.1-9.0.106-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4804" version="1" class="patch">
	<metadata>
		<title>security update for xdg-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-4055" ref_url="https://www.suse.com/security/cve/CVE-2022-4055/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7672.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7672.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4055/">CVE-2022-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4055">CVE-2022-4055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985467" comment="xdg-utils-1.1.3-13.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4805" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-4123" ref_url="https://www.suse.com/security/cve/CVE-2025-4123/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7893.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7893.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-4123/">CVE-2025-4123 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4123">CVE-2025-4123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985468" comment="grafana-10.2.6-13.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985469" comment="grafana-selinux-10.2.6-13.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4806" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21756" ref_url="https://www.suse.com/security/cve/CVE-2025-21756/" source="CVE"/>
		<reference ref_id="CVE-2025-21966" ref_url="https://www.suse.com/security/cve/CVE-2025-21966/" source="CVE"/>
		<reference ref_id="CVE-2025-37749" ref_url="https://www.suse.com/security/cve/CVE-2025-37749/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7903.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7903.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21756/">CVE-2025-21756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21756">CVE-2025-21756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21966/">CVE-2025-21966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21966">CVE-2025-21966 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37749/">CVE-2025-37749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37749">CVE-2025-37749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985610" comment="kernel-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985611" comment="kernel-abi-stablelists-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985612" comment="kernel-core-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985613" comment="kernel-cross-headers-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985614" comment="kernel-debug-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985615" comment="kernel-debug-core-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985618" comment="kernel-debug-modules-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985619" comment="kernel-debug-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985620" comment="kernel-debug-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985621" comment="kernel-debug-uki-virt-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985624" comment="kernel-doc-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985625" comment="kernel-headers-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985626" comment="kernel-modules-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985627" comment="kernel-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985628" comment="kernel-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985629" comment="kernel-rt-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985630" comment="kernel-rt-core-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985631" comment="kernel-rt-debug-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985632" comment="kernel-rt-debug-core-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985634" comment="kernel-rt-debug-kvm-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985635" comment="kernel-rt-debug-modules-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985636" comment="kernel-rt-debug-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985637" comment="kernel-rt-debug-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985639" comment="kernel-rt-kvm-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985640" comment="kernel-rt-modules-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985641" comment="kernel-rt-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985642" comment="kernel-rt-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985643" comment="kernel-tools-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985644" comment="kernel-tools-libs-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985646" comment="kernel-uki-virt-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985647" comment="kernel-uki-virt-addons-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985648" comment="libperf-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985649" comment="perf-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985650" comment="python3-perf-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985651" comment="rtla-5.14.0-570.17.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985652" comment="rv-5.14.0-570.17.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4807" version="1" class="patch">
	<metadata>
		<title>security update for compat-openssl11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7937.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7937.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984055" comment="compat-openssl11-1.1.1k-5.el9_6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4808" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-31205" ref_url="https://www.suse.com/security/cve/CVE-2025-31205/" source="CVE"/>
		<reference ref_id="CVE-2025-31257" ref_url="https://www.suse.com/security/cve/CVE-2025-31257/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7995.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7995.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-31205/">CVE-2025-31205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31205">CVE-2025-31205 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31257/">CVE-2025-31257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31257">CVE-2025-31257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985470" comment="webkit2gtk3-2.48.2-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985471" comment="webkit2gtk3-devel-2.48.2-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985472" comment="webkit2gtk3-jsc-2.48.2-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985473" comment="webkit2gtk3-jsc-devel-2.48.2-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4809" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-4918" ref_url="https://www.suse.com/security/cve/CVE-2025-4918/" source="CVE"/>
		<reference ref_id="CVE-2025-4919" ref_url="https://www.suse.com/security/cve/CVE-2025-4919/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8049.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8049.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4918/">CVE-2025-4918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4918">CVE-2025-4918 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4919/">CVE-2025-4919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4919">CVE-2025-4919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985474" comment="firefox-128.10.1-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985475" comment="firefox-x11-128.10.1-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4810" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-2784" ref_url="https://www.suse.com/security/cve/CVE-2025-2784/" source="CVE"/>
		<reference ref_id="CVE-2025-32049" ref_url="https://www.suse.com/security/cve/CVE-2025-32049/" source="CVE"/>
		<reference ref_id="CVE-2025-32914" ref_url="https://www.suse.com/security/cve/CVE-2025-32914/" source="CVE"/>
		<reference ref_id="CVE-2025-4948" ref_url="https://www.suse.com/security/cve/CVE-2025-4948/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8126.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8126.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2784/">CVE-2025-2784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2784">CVE-2025-2784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32049/">CVE-2025-32049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32049">CVE-2025-32049 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-32914/">CVE-2025-32914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32914">CVE-2025-32914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4948/">CVE-2025-4948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4948">CVE-2025-4948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009984056" comment="libsoup-2.72.0-10.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984057" comment="libsoup-devel-2.72.0-10.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4811" version="1" class="patch">
	<metadata>
		<title>security update for python-tornado (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-47287" ref_url="https://www.suse.com/security/cve/CVE-2025-47287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8136.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8136.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47287/">CVE-2025-47287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47287">CVE-2025-47287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985476" comment="python3-tornado-6.4.2-2.el9_6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4812" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21964" ref_url="https://www.suse.com/security/cve/CVE-2025-21964/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8142.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8142.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21964/">CVE-2025-21964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21964">CVE-2025-21964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985653" comment="kernel-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985654" comment="kernel-abi-stablelists-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985655" comment="kernel-core-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985656" comment="kernel-cross-headers-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985657" comment="kernel-debug-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985658" comment="kernel-debug-core-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985661" comment="kernel-debug-modules-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985662" comment="kernel-debug-modules-core-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985663" comment="kernel-debug-modules-extra-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985664" comment="kernel-debug-uki-virt-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985667" comment="kernel-doc-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985668" comment="kernel-headers-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985669" comment="kernel-modules-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985670" comment="kernel-modules-core-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985671" comment="kernel-modules-extra-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985672" comment="kernel-rt-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985673" comment="kernel-rt-core-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985674" comment="kernel-rt-debug-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985675" comment="kernel-rt-debug-core-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985677" comment="kernel-rt-debug-kvm-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985678" comment="kernel-rt-debug-modules-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985679" comment="kernel-rt-debug-modules-core-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985680" comment="kernel-rt-debug-modules-extra-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985682" comment="kernel-rt-kvm-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985683" comment="kernel-rt-modules-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985684" comment="kernel-rt-modules-core-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985685" comment="kernel-rt-modules-extra-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985686" comment="kernel-tools-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985687" comment="kernel-tools-libs-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985689" comment="kernel-uki-virt-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985690" comment="kernel-uki-virt-addons-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985691" comment="libperf-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985692" comment="perf-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985693" comment="python3-perf-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985694" comment="rtla-5.14.0-570.18.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985695" comment="rv-5.14.0-570.18.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4813" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-bad-free (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-3887" ref_url="https://www.suse.com/security/cve/CVE-2025-3887/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8183.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8183.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3887/">CVE-2025-3887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3887">CVE-2025-3887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985477" comment="gstreamer1-plugins-bad-free-1.22.12-4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985478" comment="gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985479" comment="gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4814" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-8508" ref_url="https://www.suse.com/security/cve/CVE-2024-8508/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8197.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8197.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-8508/">CVE-2024-8508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8508">CVE-2024-8508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985480" comment="python3-unbound-1.16.2-18.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985481" comment="unbound-1.16.2-18.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985482" comment="unbound-devel-1.16.2-18.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985483" comment="unbound-dracut-1.16.2-18.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985484" comment="unbound-libs-1.16.2-18.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4815" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-3875" ref_url="https://www.suse.com/security/cve/CVE-2025-3875/" source="CVE"/>
		<reference ref_id="CVE-2025-3877" ref_url="https://www.suse.com/security/cve/CVE-2025-3877/" source="CVE"/>
		<reference ref_id="CVE-2025-3909" ref_url="https://www.suse.com/security/cve/CVE-2025-3909/" source="CVE"/>
		<reference ref_id="CVE-2025-3932" ref_url="https://www.suse.com/security/cve/CVE-2025-3932/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8203.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8203.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3875/">CVE-2025-3875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3875">CVE-2025-3875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3877/">CVE-2025-3877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3877">CVE-2025-3877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3909/">CVE-2025-3909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3909">CVE-2025-3909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3932/">CVE-2025-3932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3932">CVE-2025-3932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985485" comment="thunderbird-128.10.1-1.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4816" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-5263" ref_url="https://www.suse.com/security/cve/CVE-2025-5263/" source="CVE"/>
		<reference ref_id="CVE-2025-5264" ref_url="https://www.suse.com/security/cve/CVE-2025-5264/" source="CVE"/>
		<reference ref_id="CVE-2025-5266" ref_url="https://www.suse.com/security/cve/CVE-2025-5266/" source="CVE"/>
		<reference ref_id="CVE-2025-5267" ref_url="https://www.suse.com/security/cve/CVE-2025-5267/" source="CVE"/>
		<reference ref_id="CVE-2025-5268" ref_url="https://www.suse.com/security/cve/CVE-2025-5268/" source="CVE"/>
		<reference ref_id="CVE-2025-5269" ref_url="https://www.suse.com/security/cve/CVE-2025-5269/" source="CVE"/>
		<reference ref_id="CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8293.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8293.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-5263/">CVE-2025-5263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5263">CVE-2025-5263 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5264/">CVE-2025-5264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5264">CVE-2025-5264 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5266/">CVE-2025-5266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5266">CVE-2025-5266 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5267/">CVE-2025-5267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5267">CVE-2025-5267 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5268/">CVE-2025-5268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5268">CVE-2025-5268 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5269/">CVE-2025-5269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5269">CVE-2025-5269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985486" comment="firefox-128.11.0-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985487" comment="firefox-x11-128.11.0-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4817" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2022-3424" ref_url="https://www.suse.com/security/cve/CVE-2022-3424/" source="CVE"/>
		<reference ref_id="CVE-2025-21764" ref_url="https://www.suse.com/security/cve/CVE-2025-21764/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8333.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8333.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3424/">CVE-2022-3424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21764/">CVE-2025-21764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21764">CVE-2025-21764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985978" comment="kernel-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985979" comment="kernel-abi-stablelists-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985980" comment="kernel-core-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985981" comment="kernel-cross-headers-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985982" comment="kernel-debug-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985983" comment="kernel-debug-core-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985986" comment="kernel-debug-modules-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985987" comment="kernel-debug-modules-core-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985988" comment="kernel-debug-modules-extra-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985989" comment="kernel-debug-uki-virt-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985992" comment="kernel-doc-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985993" comment="kernel-headers-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985994" comment="kernel-modules-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985995" comment="kernel-modules-core-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985996" comment="kernel-modules-extra-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985997" comment="kernel-rt-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985998" comment="kernel-rt-core-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985999" comment="kernel-rt-debug-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986000" comment="kernel-rt-debug-core-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986002" comment="kernel-rt-debug-kvm-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986003" comment="kernel-rt-debug-modules-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986004" comment="kernel-rt-debug-modules-core-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986005" comment="kernel-rt-debug-modules-extra-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986007" comment="kernel-rt-kvm-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986008" comment="kernel-rt-modules-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986009" comment="kernel-rt-modules-core-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986010" comment="kernel-rt-modules-extra-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986011" comment="kernel-tools-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986012" comment="kernel-tools-libs-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986014" comment="kernel-uki-virt-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986015" comment="kernel-uki-virt-addons-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986016" comment="libperf-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986017" comment="perf-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986018" comment="python3-perf-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986019" comment="rtla-5.14.0-570.19.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986020" comment="rv-5.14.0-570.19.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4818" version="1" class="patch">
	<metadata>
		<title>security update for varnish (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-47905" ref_url="https://www.suse.com/security/cve/CVE-2025-47905/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8337.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8337.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47905/">CVE-2025-47905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47905">CVE-2025-47905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985818" comment="varnish-6.6.2-6.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985819" comment="varnish-devel-6.6.2-6.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985820" comment="varnish-docs-6.6.2-6.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4819" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-23165" ref_url="https://www.suse.com/security/cve/CVE-2025-23165/" source="CVE"/>
		<reference ref_id="CVE-2025-23166" ref_url="https://www.suse.com/security/cve/CVE-2025-23166/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8467.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8467.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23165/">CVE-2025-23165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23165">CVE-2025-23165 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23166/">CVE-2025-23166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23166">CVE-2025-23166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986177" comment="nodejs-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986178" comment="nodejs-devel-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986179" comment="nodejs-docs-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986180" comment="nodejs-full-i18n-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986181" comment="nodejs-libs-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984012" comment="nodejs-nodemon-3.0.1-1.module+el9.6.0+23062+9e7801b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984013" comment="nodejs-packaging-2021.06-4.module+el9.6.0+23062+9e7801b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009984014" comment="nodejs-packaging-bundler-2021.06-4.module+el9.6.0+23062+9e7801b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986182" comment="npm-10.9.2-1.22.16.0.1.module+el9.6.0+23151+b1496e9d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986183" comment="v8-12.4-devel-12.4.254.21-1.22.16.0.1.module+el9.6.0+23151+b1496e9d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4820" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-23165" ref_url="https://www.suse.com/security/cve/CVE-2025-23165/" source="CVE"/>
		<reference ref_id="CVE-2025-23166" ref_url="https://www.suse.com/security/cve/CVE-2025-23166/" source="CVE"/>
		<reference ref_id="CVE-2025-23167" ref_url="https://www.suse.com/security/cve/CVE-2025-23167/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8468.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8468.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23165/">CVE-2025-23165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23165">CVE-2025-23165 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23166/">CVE-2025-23166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23166">CVE-2025-23166 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23167/">CVE-2025-23167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23167">CVE-2025-23167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986184" comment="nodejs-20.19.2-1.module+el9.6.0+23146+be9976bd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986185" comment="nodejs-devel-20.19.2-1.module+el9.6.0+23146+be9976bd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986186" comment="nodejs-docs-20.19.2-1.module+el9.6.0+23146+be9976bd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986187" comment="nodejs-full-i18n-20.19.2-1.module+el9.6.0+23146+be9976bd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986188" comment="nodejs-nodemon-3.0.1-1.module+el9.6.0+23146+be9976bd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986189" comment="nodejs-packaging-2021.06-4.module+el9.6.0+23146+be9976bd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986190" comment="nodejs-packaging-bundler-2021.06-4.module+el9.6.0+23146+be9976bd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986191" comment="npm-10.8.2-1.20.19.2.1.module+el9.6.0+23146+be9976bd is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4821" version="1" class="patch">
	<metadata>
		<title>security update for golang (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8476.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8476.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986021" comment="go-toolset-1.23.9-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986022" comment="golang-1.23.9-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986023" comment="golang-bin-1.23.9-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986024" comment="golang-docs-1.23.9-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986025" comment="golang-misc-1.23.9-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986026" comment="golang-race-1.23.9-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986027" comment="golang-src-1.23.9-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986028" comment="golang-tests-1.23.9-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4822" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-4918" ref_url="https://www.suse.com/security/cve/CVE-2025-4918/" source="CVE"/>
		<reference ref_id="CVE-2025-4919" ref_url="https://www.suse.com/security/cve/CVE-2025-4919/" source="CVE"/>
		<reference ref_id="CVE-2025-5263" ref_url="https://www.suse.com/security/cve/CVE-2025-5263/" source="CVE"/>
		<reference ref_id="CVE-2025-5264" ref_url="https://www.suse.com/security/cve/CVE-2025-5264/" source="CVE"/>
		<reference ref_id="CVE-2025-5266" ref_url="https://www.suse.com/security/cve/CVE-2025-5266/" source="CVE"/>
		<reference ref_id="CVE-2025-5267" ref_url="https://www.suse.com/security/cve/CVE-2025-5267/" source="CVE"/>
		<reference ref_id="CVE-2025-5268" ref_url="https://www.suse.com/security/cve/CVE-2025-5268/" source="CVE"/>
		<reference ref_id="CVE-2025-5269" ref_url="https://www.suse.com/security/cve/CVE-2025-5269/" source="CVE"/>
		<reference ref_id="CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8607.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8607.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4918/">CVE-2025-4918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4918">CVE-2025-4918 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4919/">CVE-2025-4919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4919">CVE-2025-4919 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-5263/">CVE-2025-5263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5263">CVE-2025-5263 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5264/">CVE-2025-5264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5264">CVE-2025-5264 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5266/">CVE-2025-5266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5266">CVE-2025-5266 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5267/">CVE-2025-5267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5267">CVE-2025-5267 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5268/">CVE-2025-5268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5268">CVE-2025-5268 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5269/">CVE-2025-5269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5269">CVE-2025-5269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986192" comment="thunderbird-128.11.0-1.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4823" version="1" class="patch">
	<metadata>
		<title>security update for perl-FCGI (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-40907" ref_url="https://www.suse.com/security/cve/CVE-2025-40907/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8635.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8635.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-40907/">CVE-2025-40907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40907">CVE-2025-40907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986193" comment="perl-FCGI-0.79-8.1.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4824" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21920" ref_url="https://www.suse.com/security/cve/CVE-2025-21920/" source="CVE"/>
		<reference ref_id="CVE-2025-21926" ref_url="https://www.suse.com/security/cve/CVE-2025-21926/" source="CVE"/>
		<reference ref_id="CVE-2025-21997" ref_url="https://www.suse.com/security/cve/CVE-2025-21997/" source="CVE"/>
		<reference ref_id="CVE-2025-22055" ref_url="https://www.suse.com/security/cve/CVE-2025-22055/" source="CVE"/>
		<reference ref_id="CVE-2025-37785" ref_url="https://www.suse.com/security/cve/CVE-2025-37785/" source="CVE"/>
		<reference ref_id="CVE-2025-37943" ref_url="https://www.suse.com/security/cve/CVE-2025-37943/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8643.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8643.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21920/">CVE-2025-21920 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21920">CVE-2025-21920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21926/">CVE-2025-21926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21926">CVE-2025-21926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21997/">CVE-2025-21997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21997">CVE-2025-21997 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22055/">CVE-2025-22055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22055">CVE-2025-22055 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37785/">CVE-2025-37785 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37785">CVE-2025-37785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37943/">CVE-2025-37943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37943">CVE-2025-37943 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986194" comment="kernel-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986195" comment="kernel-abi-stablelists-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986196" comment="kernel-core-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986197" comment="kernel-cross-headers-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986198" comment="kernel-debug-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986199" comment="kernel-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986202" comment="kernel-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986203" comment="kernel-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986204" comment="kernel-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986205" comment="kernel-debug-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986208" comment="kernel-doc-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986209" comment="kernel-headers-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986210" comment="kernel-modules-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986211" comment="kernel-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986212" comment="kernel-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986213" comment="kernel-rt-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986214" comment="kernel-rt-core-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986215" comment="kernel-rt-debug-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986216" comment="kernel-rt-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986218" comment="kernel-rt-debug-kvm-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986219" comment="kernel-rt-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986220" comment="kernel-rt-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986221" comment="kernel-rt-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986223" comment="kernel-rt-kvm-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986224" comment="kernel-rt-modules-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986225" comment="kernel-rt-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986226" comment="kernel-rt-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986227" comment="kernel-tools-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986228" comment="kernel-tools-libs-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986230" comment="kernel-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986231" comment="kernel-uki-virt-addons-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986232" comment="libperf-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986233" comment="perf-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986234" comment="python3-perf-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986235" comment="rtla-5.14.0-570.21.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986236" comment="rv-5.14.0-570.21.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4825" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-4802" ref_url="https://www.suse.com/security/cve/CVE-2025-4802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8655.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8655.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4802/">CVE-2025-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4802">CVE-2025-4802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986311" comment="glibc-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986312" comment="glibc-all-langpacks-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986313" comment="glibc-benchtests-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986314" comment="glibc-common-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986315" comment="glibc-devel-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986316" comment="glibc-doc-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986317" comment="glibc-gconv-extra-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986318" comment="glibc-headers-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986319" comment="glibc-langpack-aa-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986320" comment="glibc-langpack-af-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986321" comment="glibc-langpack-agr-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986322" comment="glibc-langpack-ak-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986323" comment="glibc-langpack-am-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986324" comment="glibc-langpack-an-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986325" comment="glibc-langpack-anp-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986326" comment="glibc-langpack-ar-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986327" comment="glibc-langpack-as-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986328" comment="glibc-langpack-ast-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986329" comment="glibc-langpack-ayc-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986330" comment="glibc-langpack-az-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986331" comment="glibc-langpack-be-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986332" comment="glibc-langpack-bem-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986333" comment="glibc-langpack-ber-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986334" comment="glibc-langpack-bg-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986335" comment="glibc-langpack-bhb-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986336" comment="glibc-langpack-bho-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986337" comment="glibc-langpack-bi-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986338" comment="glibc-langpack-bn-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986339" comment="glibc-langpack-bo-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986340" comment="glibc-langpack-br-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986341" comment="glibc-langpack-brx-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986342" comment="glibc-langpack-bs-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986343" comment="glibc-langpack-byn-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986344" comment="glibc-langpack-ca-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986345" comment="glibc-langpack-ce-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986346" comment="glibc-langpack-chr-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986347" comment="glibc-langpack-ckb-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986348" comment="glibc-langpack-cmn-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986349" comment="glibc-langpack-crh-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986350" comment="glibc-langpack-cs-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986351" comment="glibc-langpack-csb-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986352" comment="glibc-langpack-cv-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986353" comment="glibc-langpack-cy-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986354" comment="glibc-langpack-da-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986355" comment="glibc-langpack-de-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986356" comment="glibc-langpack-doi-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986357" comment="glibc-langpack-dsb-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986358" comment="glibc-langpack-dv-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986359" comment="glibc-langpack-dz-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986360" comment="glibc-langpack-el-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986361" comment="glibc-langpack-en-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986362" comment="glibc-langpack-eo-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986363" comment="glibc-langpack-es-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986364" comment="glibc-langpack-et-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986365" comment="glibc-langpack-eu-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986366" comment="glibc-langpack-fa-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986367" comment="glibc-langpack-ff-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986368" comment="glibc-langpack-fi-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986369" comment="glibc-langpack-fil-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986370" comment="glibc-langpack-fo-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986371" comment="glibc-langpack-fr-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986372" comment="glibc-langpack-fur-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986373" comment="glibc-langpack-fy-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986374" comment="glibc-langpack-ga-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986375" comment="glibc-langpack-gd-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986376" comment="glibc-langpack-gez-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986377" comment="glibc-langpack-gl-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986378" comment="glibc-langpack-gu-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986379" comment="glibc-langpack-gv-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986380" comment="glibc-langpack-ha-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986381" comment="glibc-langpack-hak-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986382" comment="glibc-langpack-he-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986383" comment="glibc-langpack-hi-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986384" comment="glibc-langpack-hif-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986385" comment="glibc-langpack-hne-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986386" comment="glibc-langpack-hr-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986387" comment="glibc-langpack-hsb-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986388" comment="glibc-langpack-ht-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986389" comment="glibc-langpack-hu-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986390" comment="glibc-langpack-hy-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986391" comment="glibc-langpack-ia-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986392" comment="glibc-langpack-id-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986393" comment="glibc-langpack-ig-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986394" comment="glibc-langpack-ik-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986395" comment="glibc-langpack-is-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986396" comment="glibc-langpack-it-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986397" comment="glibc-langpack-iu-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986398" comment="glibc-langpack-ja-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986399" comment="glibc-langpack-ka-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986400" comment="glibc-langpack-kab-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986401" comment="glibc-langpack-kk-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986402" comment="glibc-langpack-kl-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986403" comment="glibc-langpack-km-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986404" comment="glibc-langpack-kn-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986405" comment="glibc-langpack-ko-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986406" comment="glibc-langpack-kok-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986407" comment="glibc-langpack-ks-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986408" comment="glibc-langpack-ku-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986409" comment="glibc-langpack-kw-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986410" comment="glibc-langpack-ky-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986411" comment="glibc-langpack-lb-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986412" comment="glibc-langpack-lg-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986413" comment="glibc-langpack-li-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986414" comment="glibc-langpack-lij-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986415" comment="glibc-langpack-ln-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986416" comment="glibc-langpack-lo-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986417" comment="glibc-langpack-lt-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986418" comment="glibc-langpack-lv-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986419" comment="glibc-langpack-lzh-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986420" comment="glibc-langpack-mag-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986421" comment="glibc-langpack-mai-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986422" comment="glibc-langpack-mfe-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986423" comment="glibc-langpack-mg-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986424" comment="glibc-langpack-mhr-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986425" comment="glibc-langpack-mi-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986426" comment="glibc-langpack-miq-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986427" comment="glibc-langpack-mjw-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986428" comment="glibc-langpack-mk-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986429" comment="glibc-langpack-ml-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986430" comment="glibc-langpack-mn-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986431" comment="glibc-langpack-mni-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986432" comment="glibc-langpack-mnw-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986433" comment="glibc-langpack-mr-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986434" comment="glibc-langpack-ms-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986435" comment="glibc-langpack-mt-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986436" comment="glibc-langpack-my-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986437" comment="glibc-langpack-nan-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986438" comment="glibc-langpack-nb-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986439" comment="glibc-langpack-nds-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986440" comment="glibc-langpack-ne-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986441" comment="glibc-langpack-nhn-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986442" comment="glibc-langpack-niu-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986443" comment="glibc-langpack-nl-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986444" comment="glibc-langpack-nn-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986445" comment="glibc-langpack-nr-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986446" comment="glibc-langpack-nso-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986447" comment="glibc-langpack-oc-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986448" comment="glibc-langpack-om-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986449" comment="glibc-langpack-or-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986450" comment="glibc-langpack-os-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986451" comment="glibc-langpack-pa-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986452" comment="glibc-langpack-pap-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986453" comment="glibc-langpack-pl-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986454" comment="glibc-langpack-ps-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986455" comment="glibc-langpack-pt-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986456" comment="glibc-langpack-quz-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986457" comment="glibc-langpack-raj-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986458" comment="glibc-langpack-ro-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986459" comment="glibc-langpack-ru-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986460" comment="glibc-langpack-rw-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986461" comment="glibc-langpack-sa-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986462" comment="glibc-langpack-sah-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986463" comment="glibc-langpack-sat-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986464" comment="glibc-langpack-sc-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986465" comment="glibc-langpack-sd-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986466" comment="glibc-langpack-se-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986467" comment="glibc-langpack-sgs-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986468" comment="glibc-langpack-shn-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986469" comment="glibc-langpack-shs-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986470" comment="glibc-langpack-si-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986471" comment="glibc-langpack-sid-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986472" comment="glibc-langpack-sk-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986473" comment="glibc-langpack-sl-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986474" comment="glibc-langpack-sm-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986475" comment="glibc-langpack-so-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986476" comment="glibc-langpack-sq-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986477" comment="glibc-langpack-sr-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986478" comment="glibc-langpack-ss-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986479" comment="glibc-langpack-st-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986480" comment="glibc-langpack-sv-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986481" comment="glibc-langpack-sw-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986482" comment="glibc-langpack-szl-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986483" comment="glibc-langpack-ta-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986484" comment="glibc-langpack-tcy-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986485" comment="glibc-langpack-te-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986486" comment="glibc-langpack-tg-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986487" comment="glibc-langpack-th-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986488" comment="glibc-langpack-the-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986489" comment="glibc-langpack-ti-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986490" comment="glibc-langpack-tig-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986491" comment="glibc-langpack-tk-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986492" comment="glibc-langpack-tl-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986493" comment="glibc-langpack-tn-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986494" comment="glibc-langpack-to-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986495" comment="glibc-langpack-tpi-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986496" comment="glibc-langpack-tr-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986497" comment="glibc-langpack-ts-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986498" comment="glibc-langpack-tt-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986499" comment="glibc-langpack-ug-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986500" comment="glibc-langpack-uk-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986501" comment="glibc-langpack-unm-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986502" comment="glibc-langpack-ur-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986503" comment="glibc-langpack-uz-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986504" comment="glibc-langpack-ve-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986505" comment="glibc-langpack-vi-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986506" comment="glibc-langpack-wa-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986507" comment="glibc-langpack-wae-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986508" comment="glibc-langpack-wal-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986509" comment="glibc-langpack-wo-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986510" comment="glibc-langpack-xh-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986511" comment="glibc-langpack-yi-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986512" comment="glibc-langpack-yo-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986513" comment="glibc-langpack-yue-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986514" comment="glibc-langpack-yuw-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986515" comment="glibc-langpack-zh-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986516" comment="glibc-langpack-zu-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986517" comment="glibc-locale-source-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986518" comment="glibc-minimal-langpack-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986519" comment="glibc-nss-devel-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986520" comment="glibc-static-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986521" comment="glibc-utils-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986522" comment="libnsl-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986523" comment="nscd-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986524" comment="nss_db-2.34-168.el9_6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986525" comment="nss_hesiod-2.34-168.el9_6.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4826" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8682.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8682.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986652" comment="grafana-10.2.6-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986653" comment="grafana-selinux-10.2.6-14.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4827" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-30399" ref_url="https://www.suse.com/security/cve/CVE-2025-30399/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8813.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8813.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30399/">CVE-2025-30399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30399">CVE-2025-30399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986654" comment="aspnetcore-runtime-8.0-8.0.17-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986655" comment="aspnetcore-runtime-dbg-8.0-8.0.17-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986656" comment="aspnetcore-targeting-pack-8.0-8.0.17-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986657" comment="dotnet-apphost-pack-8.0-8.0.17-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986658" comment="dotnet-hostfxr-8.0-8.0.17-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986659" comment="dotnet-runtime-8.0-8.0.17-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986660" comment="dotnet-runtime-dbg-8.0-8.0.17-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986661" comment="dotnet-sdk-8.0-8.0.117-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986662" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986663" comment="dotnet-sdk-dbg-8.0-8.0.117-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986664" comment="dotnet-targeting-pack-8.0-8.0.17-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986665" comment="dotnet-templates-8.0-8.0.117-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4828" version="1" class="patch">
	<metadata>
		<title>security update for dotnet9.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-30399" ref_url="https://www.suse.com/security/cve/CVE-2025-30399/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8817.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8817.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30399/">CVE-2025-30399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30399">CVE-2025-30399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986666" comment="aspnetcore-runtime-9.0-9.0.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986667" comment="aspnetcore-runtime-dbg-9.0-9.0.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986668" comment="aspnetcore-targeting-pack-9.0-9.0.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986669" comment="dotnet-apphost-pack-9.0-9.0.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986670" comment="dotnet-host-9.0.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986671" comment="dotnet-hostfxr-9.0-9.0.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986672" comment="dotnet-runtime-9.0-9.0.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986673" comment="dotnet-runtime-dbg-9.0-9.0.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986674" comment="dotnet-sdk-9.0-9.0.107-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986675" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986676" comment="dotnet-sdk-aot-9.0-9.0.107-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986677" comment="dotnet-sdk-dbg-9.0-9.0.107-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986678" comment="dotnet-targeting-pack-9.0-9.0.6-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986679" comment="dotnet-templates-9.0-9.0.107-1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986680" comment="netstandard-targeting-pack-2.1-9.0.107-1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4829" version="1" class="patch">
	<metadata>
		<title>security update for mod_security (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-47947" ref_url="https://www.suse.com/security/cve/CVE-2025-47947/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8837.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8837.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47947/">CVE-2025-47947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47947">CVE-2025-47947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986681" comment="mod_security-2.9.6-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986682" comment="mod_security-mlogc-2.9.6-2.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4830" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8916.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8916.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986971" comment="grafana-pcp-5.1.1-11.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4831" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21961" ref_url="https://www.suse.com/security/cve/CVE-2025-21961/" source="CVE"/>
		<reference ref_id="CVE-2025-21963" ref_url="https://www.suse.com/security/cve/CVE-2025-21963/" source="CVE"/>
		<reference ref_id="CVE-2025-21969" ref_url="https://www.suse.com/security/cve/CVE-2025-21969/" source="CVE"/>
		<reference ref_id="CVE-2025-21979" ref_url="https://www.suse.com/security/cve/CVE-2025-21979/" source="CVE"/>
		<reference ref_id="CVE-2025-21999" ref_url="https://www.suse.com/security/cve/CVE-2025-21999/" source="CVE"/>
		<reference ref_id="CVE-2025-22126" ref_url="https://www.suse.com/security/cve/CVE-2025-22126/" source="CVE"/>
		<reference ref_id="CVE-2025-37750" ref_url="https://www.suse.com/security/cve/CVE-2025-37750/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9080.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9080.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21961/">CVE-2025-21961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21961">CVE-2025-21961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21963/">CVE-2025-21963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21963">CVE-2025-21963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21969/">CVE-2025-21969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21969">CVE-2025-21969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21979/">CVE-2025-21979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21979">CVE-2025-21979 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21999/">CVE-2025-21999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21999">CVE-2025-21999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22126/">CVE-2025-22126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22126">CVE-2025-22126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37750/">CVE-2025-37750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37750">CVE-2025-37750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986972" comment="kernel-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986973" comment="kernel-abi-stablelists-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986974" comment="kernel-core-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986975" comment="kernel-cross-headers-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986976" comment="kernel-debug-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986977" comment="kernel-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986980" comment="kernel-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986981" comment="kernel-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986982" comment="kernel-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986983" comment="kernel-debug-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986986" comment="kernel-doc-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986987" comment="kernel-headers-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986988" comment="kernel-modules-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986989" comment="kernel-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986990" comment="kernel-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986991" comment="kernel-rt-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986992" comment="kernel-rt-core-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986993" comment="kernel-rt-debug-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986994" comment="kernel-rt-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986996" comment="kernel-rt-debug-kvm-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986997" comment="kernel-rt-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986998" comment="kernel-rt-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986999" comment="kernel-rt-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987001" comment="kernel-rt-kvm-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987002" comment="kernel-rt-modules-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987003" comment="kernel-rt-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987004" comment="kernel-rt-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987005" comment="kernel-tools-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987006" comment="kernel-tools-libs-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987008" comment="kernel-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987009" comment="kernel-uki-virt-addons-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987010" comment="libperf-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987011" comment="perf-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987012" comment="python3-perf-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987013" comment="rtla-5.14.0-570.22.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987014" comment="rv-5.14.0-570.22.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4832" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9106.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9106.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987015" comment="git-lfs-3.6.1-2.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4833" version="1" class="patch">
	<metadata>
		<title>security update for apache-commons-beanutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-48734" ref_url="https://www.suse.com/security/cve/CVE-2025-48734/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9114.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9114.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48734/">CVE-2025-48734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48734">CVE-2025-48734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987016" comment="apache-commons-beanutils-1.9.4-10.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4834" version="1" class="patch">
	<metadata>
		<title>security update for libvpx (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9118.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9118.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009987017" comment="libvpx-1.9.0-9.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987018" comment="libvpx-devel-1.9.0-9.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4835" version="1" class="patch">
	<metadata>
		<title>security update for containernetworking-plugins (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9143.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9143.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986868" comment="containernetworking-plugins-1.6.2-2.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4836" version="1" class="patch">
	<metadata>
		<title>security update for podman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9144.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9144.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986869" comment="podman-5.4.0-10.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986870" comment="podman-docker-5.4.0-10.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986871" comment="podman-plugins-5.4.0-10.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986872" comment="podman-remote-5.4.0-10.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986873" comment="podman-tests-5.4.0-10.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4837" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9145.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9145.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986874" comment="skopeo-1.18.1-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986875" comment="skopeo-tests-1.18.1-2.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4838" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9147.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9147.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986876" comment="buildah-1.39.4-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986877" comment="buildah-tests-1.39.4-2.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4839" version="1" class="patch">
	<metadata>
		<title>security update for gvisor-tap-vsock (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9150.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9150.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986878" comment="gvisor-tap-vsock-0.8.5-2.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986879" comment="gvisor-tap-vsock-gvforwarder-0.8.5-2.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4840" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-48797" ref_url="https://www.suse.com/security/cve/CVE-2025-48797/" source="CVE"/>
		<reference ref_id="CVE-2025-48798" ref_url="https://www.suse.com/security/cve/CVE-2025-48798/" source="CVE"/>
		<reference ref_id="CVE-2025-5473" ref_url="https://www.suse.com/security/cve/CVE-2025-5473/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9162.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9162.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48797/">CVE-2025-48797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48797">CVE-2025-48797 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48798/">CVE-2025-48798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48798">CVE-2025-48798 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5473/">CVE-2025-5473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5473">CVE-2025-5473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009987305" comment="gimp-2.99.8-4.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987306" comment="gimp-libs-2.99.8-4.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4841" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-4404" ref_url="https://www.suse.com/security/cve/CVE-2025-4404/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9184.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9184.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4404/">CVE-2025-4404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4404">CVE-2025-4404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009987307" comment="ipa-client-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987308" comment="ipa-client-common-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987309" comment="ipa-client-encrypted-dns-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987310" comment="ipa-client-epn-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987311" comment="ipa-client-samba-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987312" comment="ipa-common-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987313" comment="ipa-selinux-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987314" comment="ipa-selinux-luna-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987315" comment="ipa-selinux-nfast-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987316" comment="ipa-server-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987317" comment="ipa-server-common-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987318" comment="ipa-server-dns-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987319" comment="ipa-server-encrypted-dns-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987320" comment="ipa-server-trust-ad-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987321" comment="python3-ipaclient-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987322" comment="python3-ipalib-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987323" comment="python3-ipaserver-4.12.2-14.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987324" comment="python3-ipatests-4.12.2-14.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4842" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-21883" ref_url="https://www.suse.com/security/cve/CVE-2025-21883/" source="CVE"/>
		<reference ref_id="CVE-2025-21919" ref_url="https://www.suse.com/security/cve/CVE-2025-21919/" source="CVE"/>
		<reference ref_id="CVE-2025-22104" ref_url="https://www.suse.com/security/cve/CVE-2025-22104/" source="CVE"/>
		<reference ref_id="CVE-2025-23150" ref_url="https://www.suse.com/security/cve/CVE-2025-23150/" source="CVE"/>
		<reference ref_id="CVE-2025-37738" ref_url="https://www.suse.com/security/cve/CVE-2025-37738/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9302.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9302.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21883/">CVE-2025-21883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21883">CVE-2025-21883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21919/">CVE-2025-21919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21919">CVE-2025-21919 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22104/">CVE-2025-22104 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22104">CVE-2025-22104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23150/">CVE-2025-23150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23150">CVE-2025-23150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37738/">CVE-2025-37738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37738">CVE-2025-37738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009996844" comment="kernel-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996845" comment="kernel-abi-stablelists-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996846" comment="kernel-core-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996847" comment="kernel-cross-headers-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996848" comment="kernel-debug-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996849" comment="kernel-debug-core-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996852" comment="kernel-debug-modules-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996853" comment="kernel-debug-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996854" comment="kernel-debug-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996855" comment="kernel-debug-uki-virt-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996858" comment="kernel-doc-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996859" comment="kernel-headers-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996860" comment="kernel-modules-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996861" comment="kernel-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996862" comment="kernel-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996863" comment="kernel-rt-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996864" comment="kernel-rt-core-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996865" comment="kernel-rt-debug-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996866" comment="kernel-rt-debug-core-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996868" comment="kernel-rt-debug-kvm-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996869" comment="kernel-rt-debug-modules-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996870" comment="kernel-rt-debug-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996871" comment="kernel-rt-debug-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996873" comment="kernel-rt-kvm-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996874" comment="kernel-rt-modules-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996875" comment="kernel-rt-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996876" comment="kernel-rt-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996877" comment="kernel-tools-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996878" comment="kernel-tools-libs-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996880" comment="kernel-uki-virt-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996881" comment="kernel-uki-virt-addons-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996882" comment="libperf-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996883" comment="perf-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996884" comment="python3-perf-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996885" comment="rtla-5.14.0-570.23.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996886" comment="rv-5.14.0-570.23.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4843" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-49175" ref_url="https://www.suse.com/security/cve/CVE-2025-49175/" source="CVE"/>
		<reference ref_id="CVE-2025-49176" ref_url="https://www.suse.com/security/cve/CVE-2025-49176/" source="CVE"/>
		<reference ref_id="CVE-2025-49177" ref_url="https://www.suse.com/security/cve/CVE-2025-49177/" source="CVE"/>
		<reference ref_id="CVE-2025-49178" ref_url="https://www.suse.com/security/cve/CVE-2025-49178/" source="CVE"/>
		<reference ref_id="CVE-2025-49179" ref_url="https://www.suse.com/security/cve/CVE-2025-49179/" source="CVE"/>
		<reference ref_id="CVE-2025-49180" ref_url="https://www.suse.com/security/cve/CVE-2025-49180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9303.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9303.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49175/">CVE-2025-49175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49175">CVE-2025-49175 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49176/">CVE-2025-49176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49176">CVE-2025-49176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49177/">CVE-2025-49177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49177">CVE-2025-49177 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49178/">CVE-2025-49178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49178">CVE-2025-49178 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49179/">CVE-2025-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49179">CVE-2025-49179 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49180/">CVE-2025-49180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49180">CVE-2025-49180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009996887" comment="xorg-x11-server-Xdmx-1.20.11-31.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996888" comment="xorg-x11-server-Xephyr-1.20.11-31.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996889" comment="xorg-x11-server-Xnest-1.20.11-31.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996890" comment="xorg-x11-server-Xorg-1.20.11-31.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996891" comment="xorg-x11-server-Xvfb-1.20.11-31.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996892" comment="xorg-x11-server-Xwayland-23.2.7-4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996893" comment="xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996894" comment="xorg-x11-server-common-1.20.11-31.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996895" comment="xorg-x11-server-devel-1.20.11-31.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996896" comment="xorg-x11-server-source-1.20.11-31.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4844" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-49175" ref_url="https://www.suse.com/security/cve/CVE-2025-49175/" source="CVE"/>
		<reference ref_id="CVE-2025-49176" ref_url="https://www.suse.com/security/cve/CVE-2025-49176/" source="CVE"/>
		<reference ref_id="CVE-2025-49178" ref_url="https://www.suse.com/security/cve/CVE-2025-49178/" source="CVE"/>
		<reference ref_id="CVE-2025-49179" ref_url="https://www.suse.com/security/cve/CVE-2025-49179/" source="CVE"/>
		<reference ref_id="CVE-2025-49180" ref_url="https://www.suse.com/security/cve/CVE-2025-49180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9306.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9306.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49175/">CVE-2025-49175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49175">CVE-2025-49175 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49176/">CVE-2025-49176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49176">CVE-2025-49176 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49178/">CVE-2025-49178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49178">CVE-2025-49178 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49179/">CVE-2025-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49179">CVE-2025-49179 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49180/">CVE-2025-49180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49180">CVE-2025-49180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009996897" comment="tigervnc-1.14.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996898" comment="tigervnc-icons-1.14.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996899" comment="tigervnc-license-1.14.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996900" comment="tigervnc-selinux-1.14.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996901" comment="tigervnc-server-1.14.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996902" comment="tigervnc-server-minimal-1.14.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996903" comment="tigervnc-server-module-1.14.1-8.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4845" version="1" class="patch">
	<metadata>
		<title>security update for libblockdev (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-6019" ref_url="https://www.suse.com/security/cve/CVE-2025-6019/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9327.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9327.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6019/">CVE-2025-6019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6019">CVE-2025-6019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009996904" comment="libblockdev-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996905" comment="libblockdev-crypto-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996906" comment="libblockdev-dm-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996907" comment="libblockdev-fs-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996908" comment="libblockdev-kbd-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996909" comment="libblockdev-loop-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996910" comment="libblockdev-lvm-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996911" comment="libblockdev-lvm-dbus-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996912" comment="libblockdev-mdraid-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996913" comment="libblockdev-mpath-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996914" comment="libblockdev-nvdimm-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996915" comment="libblockdev-nvme-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996916" comment="libblockdev-part-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996917" comment="libblockdev-plugins-all-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996918" comment="libblockdev-swap-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996919" comment="libblockdev-tools-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996920" comment="libblockdev-utils-2.28-14.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996921" comment="python3-blockdev-2.28-14.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4846" version="1" class="patch">
	<metadata>
		<title>security update for perl-YAML-LibYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-40908" ref_url="https://www.suse.com/security/cve/CVE-2025-40908/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9330.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9330.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40908/">CVE-2025-40908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40908">CVE-2025-40908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996922" comment="perl-YAML-LibYAML-0.82-6.1.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4847" version="1" class="patch">
	<metadata>
		<title>security update for mod_auth_openidc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-3891" ref_url="https://www.suse.com/security/cve/CVE-2025-3891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9396.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9396.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3891/">CVE-2025-3891 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3891">CVE-2025-3891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996923" comment="mod_auth_openidc-2.4.10-1.el9_6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4848" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-3576" ref_url="https://www.suse.com/security/cve/CVE-2025-3576/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9430.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9430.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3576/">CVE-2025-3576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3576">CVE-2025-3576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009996924" comment="krb5-devel-1.21.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996925" comment="krb5-libs-1.21.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996926" comment="krb5-pkinit-1.21.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996927" comment="krb5-server-1.21.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996928" comment="krb5-server-ldap-1.21.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996929" comment="krb5-workstation-1.21.1-8.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996930" comment="libkadm5-1.21.1-8.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4849" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-25724" ref_url="https://www.suse.com/security/cve/CVE-2025-25724/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9431.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9431.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25724/">CVE-2025-25724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25724">CVE-2025-25724 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009996931" comment="bsdtar-3.5.3-5.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996932" comment="libarchive-3.5.3-5.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996933" comment="libarchive-devel-3.5.3-5.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4850" version="1" class="patch">
	<metadata>
		<title>security update for iputils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-47268" ref_url="https://www.suse.com/security/cve/CVE-2025-47268/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9432.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9432.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47268/">CVE-2025-47268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47268">CVE-2025-47268 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009996934" comment="iputils-20210202-11.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996935" comment="iputils-ninfod-20210202-11.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4851" version="1" class="patch">
	<metadata>
		<title>security update for mod_proxy_cluster (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-10306" ref_url="https://www.suse.com/security/cve/CVE-2024-10306/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9434.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9434.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10306/">CVE-2024-10306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10306">CVE-2024-10306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996936" comment="mod_proxy_cluster-1.3.22-1.el9_6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4852" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2024-53920" ref_url="https://www.suse.com/security/cve/CVE-2024-53920/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9448.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9448.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53920/">CVE-2024-53920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53920">CVE-2024-53920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009996937" comment="emacs-27.2-14.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996938" comment="emacs-common-27.2-14.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996939" comment="emacs-filesystem-27.2-14.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996940" comment="emacs-lucid-27.2-14.el9_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996941" comment="emacs-nox-27.2-14.el9_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4853" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-5455" ref_url="https://www.suse.com/security/cve/CVE-2025-5455/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9462.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9462.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-5455/">CVE-2025-5455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5455">CVE-2025-5455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009996942" comment="qt5-qtbase-5.15.9-11.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996943" comment="qt5-qtbase-common-5.15.9-11.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996944" comment="qt5-qtbase-devel-5.15.9-11.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996945" comment="qt5-qtbase-examples-5.15.9-11.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996946" comment="qt5-qtbase-gui-5.15.9-11.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996947" comment="qt5-qtbase-mysql-5.15.9-11.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996948" comment="qt5-qtbase-odbc-5.15.9-11.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996949" comment="qt5-qtbase-postgresql-5.15.9-11.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996950" comment="qt5-qtbase-private-devel-5.15.9-11.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996951" comment="qt5-qtbase-static-5.15.9-11.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4854" version="1" class="patch">
	<metadata>
		<title>security update for perl-File-Find-Rule (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2011-10007" ref_url="https://www.suse.com/security/cve/CVE-2011-10007/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9517.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9517.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2011-10007/">CVE-2011-10007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-10007">CVE-2011-10007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997705" comment="perl-File-Find-Rule-0.34-19.1.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4855" version="1" class="patch">
	<metadata>
		<title>security update for pam (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-6020" ref_url="https://www.suse.com/security/cve/CVE-2025-6020/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9526.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9526.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6020/">CVE-2025-6020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6020">CVE-2025-6020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009997706" comment="pam-1.5.1-25.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997707" comment="pam-devel-1.5.1-25.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997708" comment="pam-docs-1.5.1-25.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4856" version="1" class="patch">
	<metadata>
		<title>security update for weldr-client (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9635.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9635.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997709" comment="weldr-client-35.12-4.el9_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4857" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-5702" ref_url="https://www.suse.com/security/cve/CVE-2025-5702/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9877.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9877.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5702/">CVE-2025-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5702">CVE-2025-5702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009997710" comment="glibc-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997711" comment="glibc-all-langpacks-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997712" comment="glibc-benchtests-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997713" comment="glibc-common-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997714" comment="glibc-devel-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997715" comment="glibc-doc-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997716" comment="glibc-gconv-extra-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997717" comment="glibc-headers-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997718" comment="glibc-langpack-aa-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997719" comment="glibc-langpack-af-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997720" comment="glibc-langpack-agr-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997721" comment="glibc-langpack-ak-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997722" comment="glibc-langpack-am-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997723" comment="glibc-langpack-an-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997724" comment="glibc-langpack-anp-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997725" comment="glibc-langpack-ar-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997726" comment="glibc-langpack-as-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997727" comment="glibc-langpack-ast-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997728" comment="glibc-langpack-ayc-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997729" comment="glibc-langpack-az-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997730" comment="glibc-langpack-be-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997731" comment="glibc-langpack-bem-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997732" comment="glibc-langpack-ber-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997733" comment="glibc-langpack-bg-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997734" comment="glibc-langpack-bhb-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997735" comment="glibc-langpack-bho-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997736" comment="glibc-langpack-bi-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997737" comment="glibc-langpack-bn-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997738" comment="glibc-langpack-bo-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997739" comment="glibc-langpack-br-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997740" comment="glibc-langpack-brx-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997741" comment="glibc-langpack-bs-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997742" comment="glibc-langpack-byn-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997743" comment="glibc-langpack-ca-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997744" comment="glibc-langpack-ce-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997745" comment="glibc-langpack-chr-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997746" comment="glibc-langpack-ckb-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997747" comment="glibc-langpack-cmn-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997748" comment="glibc-langpack-crh-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997749" comment="glibc-langpack-cs-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997750" comment="glibc-langpack-csb-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997751" comment="glibc-langpack-cv-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997752" comment="glibc-langpack-cy-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997753" comment="glibc-langpack-da-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997754" comment="glibc-langpack-de-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997755" comment="glibc-langpack-doi-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997756" comment="glibc-langpack-dsb-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997757" comment="glibc-langpack-dv-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997758" comment="glibc-langpack-dz-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997759" comment="glibc-langpack-el-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997760" comment="glibc-langpack-en-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997761" comment="glibc-langpack-eo-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997762" comment="glibc-langpack-es-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997763" comment="glibc-langpack-et-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997764" comment="glibc-langpack-eu-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997765" comment="glibc-langpack-fa-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997766" comment="glibc-langpack-ff-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997767" comment="glibc-langpack-fi-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997768" comment="glibc-langpack-fil-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997769" comment="glibc-langpack-fo-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997770" comment="glibc-langpack-fr-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997771" comment="glibc-langpack-fur-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997772" comment="glibc-langpack-fy-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997773" comment="glibc-langpack-ga-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997774" comment="glibc-langpack-gd-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997775" comment="glibc-langpack-gez-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997776" comment="glibc-langpack-gl-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997777" comment="glibc-langpack-gu-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997778" comment="glibc-langpack-gv-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997779" comment="glibc-langpack-ha-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997780" comment="glibc-langpack-hak-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997781" comment="glibc-langpack-he-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997782" comment="glibc-langpack-hi-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997783" comment="glibc-langpack-hif-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997784" comment="glibc-langpack-hne-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997785" comment="glibc-langpack-hr-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997786" comment="glibc-langpack-hsb-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997787" comment="glibc-langpack-ht-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997788" comment="glibc-langpack-hu-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997789" comment="glibc-langpack-hy-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997790" comment="glibc-langpack-ia-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997791" comment="glibc-langpack-id-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997792" comment="glibc-langpack-ig-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997793" comment="glibc-langpack-ik-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997794" comment="glibc-langpack-is-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997795" comment="glibc-langpack-it-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997796" comment="glibc-langpack-iu-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997797" comment="glibc-langpack-ja-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997798" comment="glibc-langpack-ka-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997799" comment="glibc-langpack-kab-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997800" comment="glibc-langpack-kk-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997801" comment="glibc-langpack-kl-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997802" comment="glibc-langpack-km-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997803" comment="glibc-langpack-kn-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997804" comment="glibc-langpack-ko-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997805" comment="glibc-langpack-kok-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997806" comment="glibc-langpack-ks-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997807" comment="glibc-langpack-ku-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997808" comment="glibc-langpack-kw-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997809" comment="glibc-langpack-ky-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997810" comment="glibc-langpack-lb-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997811" comment="glibc-langpack-lg-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997812" comment="glibc-langpack-li-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997813" comment="glibc-langpack-lij-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997814" comment="glibc-langpack-ln-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997815" comment="glibc-langpack-lo-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997816" comment="glibc-langpack-lt-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997817" comment="glibc-langpack-lv-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997818" comment="glibc-langpack-lzh-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997819" comment="glibc-langpack-mag-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997820" comment="glibc-langpack-mai-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997821" comment="glibc-langpack-mfe-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997822" comment="glibc-langpack-mg-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997823" comment="glibc-langpack-mhr-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997824" comment="glibc-langpack-mi-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997825" comment="glibc-langpack-miq-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997826" comment="glibc-langpack-mjw-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997827" comment="glibc-langpack-mk-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997828" comment="glibc-langpack-ml-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997829" comment="glibc-langpack-mn-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997830" comment="glibc-langpack-mni-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997831" comment="glibc-langpack-mnw-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997832" comment="glibc-langpack-mr-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997833" comment="glibc-langpack-ms-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997834" comment="glibc-langpack-mt-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997835" comment="glibc-langpack-my-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997836" comment="glibc-langpack-nan-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997837" comment="glibc-langpack-nb-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997838" comment="glibc-langpack-nds-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997839" comment="glibc-langpack-ne-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997840" comment="glibc-langpack-nhn-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997841" comment="glibc-langpack-niu-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997842" comment="glibc-langpack-nl-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997843" comment="glibc-langpack-nn-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997844" comment="glibc-langpack-nr-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997845" comment="glibc-langpack-nso-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997846" comment="glibc-langpack-oc-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997847" comment="glibc-langpack-om-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997848" comment="glibc-langpack-or-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997849" comment="glibc-langpack-os-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997850" comment="glibc-langpack-pa-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997851" comment="glibc-langpack-pap-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997852" comment="glibc-langpack-pl-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997853" comment="glibc-langpack-ps-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997854" comment="glibc-langpack-pt-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997855" comment="glibc-langpack-quz-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997856" comment="glibc-langpack-raj-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997857" comment="glibc-langpack-ro-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997858" comment="glibc-langpack-ru-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997859" comment="glibc-langpack-rw-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997860" comment="glibc-langpack-sa-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997861" comment="glibc-langpack-sah-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997862" comment="glibc-langpack-sat-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997863" comment="glibc-langpack-sc-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997864" comment="glibc-langpack-sd-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997865" comment="glibc-langpack-se-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997866" comment="glibc-langpack-sgs-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997867" comment="glibc-langpack-shn-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997868" comment="glibc-langpack-shs-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997869" comment="glibc-langpack-si-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997870" comment="glibc-langpack-sid-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997871" comment="glibc-langpack-sk-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997872" comment="glibc-langpack-sl-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997873" comment="glibc-langpack-sm-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997874" comment="glibc-langpack-so-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997875" comment="glibc-langpack-sq-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997876" comment="glibc-langpack-sr-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997877" comment="glibc-langpack-ss-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997878" comment="glibc-langpack-st-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997879" comment="glibc-langpack-sv-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997880" comment="glibc-langpack-sw-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997881" comment="glibc-langpack-szl-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997882" comment="glibc-langpack-ta-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997883" comment="glibc-langpack-tcy-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997884" comment="glibc-langpack-te-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997885" comment="glibc-langpack-tg-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997886" comment="glibc-langpack-th-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997887" comment="glibc-langpack-the-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997888" comment="glibc-langpack-ti-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997889" comment="glibc-langpack-tig-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997890" comment="glibc-langpack-tk-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997891" comment="glibc-langpack-tl-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997892" comment="glibc-langpack-tn-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997893" comment="glibc-langpack-to-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997894" comment="glibc-langpack-tpi-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997895" comment="glibc-langpack-tr-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997896" comment="glibc-langpack-ts-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997897" comment="glibc-langpack-tt-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997898" comment="glibc-langpack-ug-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997899" comment="glibc-langpack-uk-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997900" comment="glibc-langpack-unm-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997901" comment="glibc-langpack-ur-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997902" comment="glibc-langpack-uz-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997903" comment="glibc-langpack-ve-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997904" comment="glibc-langpack-vi-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997905" comment="glibc-langpack-wa-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997906" comment="glibc-langpack-wae-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997907" comment="glibc-langpack-wal-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997908" comment="glibc-langpack-wo-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997909" comment="glibc-langpack-xh-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997910" comment="glibc-langpack-yi-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997911" comment="glibc-langpack-yo-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997912" comment="glibc-langpack-yue-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997913" comment="glibc-langpack-yuw-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997914" comment="glibc-langpack-zh-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997915" comment="glibc-langpack-zu-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997916" comment="glibc-locale-source-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997917" comment="glibc-minimal-langpack-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997918" comment="glibc-nss-devel-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997919" comment="glibc-static-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997920" comment="glibc-utils-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997921" comment="libnsl-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997922" comment="nscd-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997923" comment="nss_db-2.34-168.el9_6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997924" comment="nss_hesiod-2.34-168.el9_6.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4858" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-52933" ref_url="https://www.suse.com/security/cve/CVE-2023-52933/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9880.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9880.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52933/">CVE-2023-52933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52933">CVE-2023-52933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009997925" comment="kernel-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997926" comment="kernel-abi-stablelists-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997927" comment="kernel-core-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997928" comment="kernel-cross-headers-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997929" comment="kernel-debug-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997930" comment="kernel-debug-core-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997933" comment="kernel-debug-modules-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997934" comment="kernel-debug-modules-core-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997935" comment="kernel-debug-modules-extra-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997936" comment="kernel-debug-uki-virt-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997939" comment="kernel-doc-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997940" comment="kernel-headers-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997941" comment="kernel-modules-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997942" comment="kernel-modules-core-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997943" comment="kernel-modules-extra-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997944" comment="kernel-rt-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997945" comment="kernel-rt-core-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997946" comment="kernel-rt-debug-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997947" comment="kernel-rt-debug-core-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997949" comment="kernel-rt-debug-kvm-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997950" comment="kernel-rt-debug-modules-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997951" comment="kernel-rt-debug-modules-core-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997952" comment="kernel-rt-debug-modules-extra-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997954" comment="kernel-rt-kvm-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997955" comment="kernel-rt-modules-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997956" comment="kernel-rt-modules-core-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997957" comment="kernel-rt-modules-extra-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997958" comment="kernel-tools-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997959" comment="kernel-tools-libs-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997961" comment="kernel-uki-virt-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997962" comment="kernel-uki-virt-addons-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997963" comment="libperf-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997964" comment="perf-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997965" comment="python3-perf-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997966" comment="rtla-5.14.0-570.24.1.el9_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997967" comment="rv-5.14.0-570.24.1.el9_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4859" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-32462" ref_url="https://www.suse.com/security/cve/CVE-2025-32462/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9978.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9978.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32462/">CVE-2025-32462 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32462">CVE-2025-32462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009997968" comment="sudo-1.9.5p2-10.el9_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997969" comment="sudo-python-plugin-1.9.5p2-10.el9_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4860" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-14-binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-11083" ref_url="https://www.suse.com/security/cve/CVE-2025-11083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0052.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0052.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11083/">CVE-2025-11083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11083">CVE-2025-11083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054543" comment="gcc-toolset-14-binutils-2.41-5.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054544" comment="gcc-toolset-14-binutils-devel-2.41-5.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054545" comment="gcc-toolset-14-binutils-gold-2.41-5.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054546" comment="gcc-toolset-14-binutils-gprofng-2.41-5.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4861" version="1" class="patch">
	<metadata>
		<title>security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-45582" ref_url="https://www.suse.com/security/cve/CVE-2025-45582/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0067.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0067.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-45582/">CVE-2025-45582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-45582">CVE-2025-45582 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054547" comment="tar-1.34-9.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4862" version="1" class="patch">
	<metadata>
		<title>security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-32365" ref_url="https://www.suse.com/security/cve/CVE-2025-32365/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0126.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0126.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32365/">CVE-2025-32365 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32365">CVE-2025-32365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054548" comment="poppler-21.01.0-23.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054549" comment="poppler-cpp-21.01.0-23.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054550" comment="poppler-cpp-devel-21.01.0-23.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054551" comment="poppler-devel-21.01.0-23.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054552" comment="poppler-glib-21.01.0-23.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054553" comment="poppler-glib-devel-21.01.0-23.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054554" comment="poppler-glib-doc-21.01.0-23.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054555" comment="poppler-qt5-21.01.0-23.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054556" comment="poppler-qt5-devel-21.01.0-23.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054557" comment="poppler-utils-21.01.0-23.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4863" version="1" class="patch">
	<metadata>
		<title>security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-13699" ref_url="https://www.suse.com/security/cve/CVE-2025-13699/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0137.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0137.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13699/">CVE-2025-13699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13699">CVE-2025-13699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054558" comment="mariadb-10.5.29-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054559" comment="mariadb-backup-10.5.29-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054560" comment="mariadb-common-10.5.29-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054561" comment="mariadb-devel-10.5.29-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054562" comment="mariadb-embedded-10.5.29-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054563" comment="mariadb-embedded-devel-10.5.29-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054564" comment="mariadb-errmsg-10.5.29-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054565" comment="mariadb-gssapi-server-10.5.29-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054566" comment="mariadb-oqgraph-engine-10.5.29-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054567" comment="mariadb-pam-10.5.29-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054568" comment="mariadb-server-10.5.29-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054569" comment="mariadb-server-galera-10.5.29-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054570" comment="mariadb-server-utils-10.5.29-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054571" comment="mariadb-test-10.5.29-3.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4864" version="1" class="patch">
	<metadata>
		<title>security update for libpng (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2025-66293" ref_url="https://www.suse.com/security/cve/CVE-2025-66293/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0238.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0238.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66293/">CVE-2025-66293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66293">CVE-2025-66293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054572" comment="libpng-1.6.37-12.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054573" comment="libpng-devel-1.6.37-12.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4865" version="1" class="patch">
	<metadata>
		<title>security update for galera (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-52969" ref_url="https://www.suse.com/security/cve/CVE-2023-52969/" source="CVE"/>
		<reference ref_id="CVE-2023-52970" ref_url="https://www.suse.com/security/cve/CVE-2023-52970/" source="CVE"/>
		<reference ref_id="CVE-2023-52971" ref_url="https://www.suse.com/security/cve/CVE-2023-52971/" source="CVE"/>
		<reference ref_id="CVE-2025-13699" ref_url="https://www.suse.com/security/cve/CVE-2025-13699/" source="CVE"/>
		<reference ref_id="CVE-2025-21490" ref_url="https://www.suse.com/security/cve/CVE-2025-21490/" source="CVE"/>
		<reference ref_id="CVE-2025-30693" ref_url="https://www.suse.com/security/cve/CVE-2025-30693/" source="CVE"/>
		<reference ref_id="CVE-2025-30722" ref_url="https://www.suse.com/security/cve/CVE-2025-30722/" source="CVE"/>
		<reference ref_id="CVE-2026-21968" ref_url="https://www.suse.com/security/cve/CVE-2026-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0247.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0247.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52969/">CVE-2023-52969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52969">CVE-2023-52969 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52970/">CVE-2023-52970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52970">CVE-2023-52970 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52971/">CVE-2023-52971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52971">CVE-2023-52971 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13699/">CVE-2025-13699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13699">CVE-2025-13699 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21490/">CVE-2025-21490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21490">CVE-2025-21490 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-30693/">CVE-2025-30693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30693">CVE-2025-30693 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30722/">CVE-2025-30722 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30722">CVE-2025-30722 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21968/">CVE-2026-21968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21968">CVE-2026-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962391" comment="galera-26.4.20-1.module+el9.5.0+22578+dc54e53f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054574" comment="mariadb-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054575" comment="mariadb-backup-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054576" comment="mariadb-common-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054577" comment="mariadb-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054578" comment="mariadb-embedded-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054579" comment="mariadb-embedded-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054580" comment="mariadb-errmsg-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054581" comment="mariadb-gssapi-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054582" comment="mariadb-oqgraph-engine-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054583" comment="mariadb-pam-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054584" comment="mariadb-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054585" comment="mariadb-server-galera-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054586" comment="mariadb-server-utils-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054587" comment="mariadb-test-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4866" version="1" class="patch">
	<metadata>
		<title>security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-58436" ref_url="https://www.suse.com/security/cve/CVE-2025-58436/" source="CVE"/>
		<reference ref_id="CVE-2025-61915" ref_url="https://www.suse.com/security/cve/CVE-2025-61915/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0312.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0312.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58436/">CVE-2025-58436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58436">CVE-2025-58436 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61915/">CVE-2025-61915 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61915">CVE-2025-61915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054588" comment="cups-2.3.3op2-34.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054589" comment="cups-client-2.3.3op2-34.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054590" comment="cups-devel-2.3.3op2-34.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054591" comment="cups-filesystem-2.3.3op2-34.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054592" comment="cups-ipptool-2.3.3op2-34.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054593" comment="cups-libs-2.3.3op2-34.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054594" comment="cups-lpd-2.3.3op2-34.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054595" comment="cups-printerapp-2.3.3op2-34.el9_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4867" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-14523" ref_url="https://www.suse.com/security/cve/CVE-2025-14523/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0422.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0422.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14523/">CVE-2025-14523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14523">CVE-2025-14523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054596" comment="libsoup-2.72.0-12.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054597" comment="libsoup-devel-2.72.0-12.el9_7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4868" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0437.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0437.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054598" comment="buildah-1.41.8-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054599" comment="buildah-tests-1.41.8-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4869" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-39806" ref_url="https://www.suse.com/security/cve/CVE-2025-39806/" source="CVE"/>
		<reference ref_id="CVE-2025-39840" ref_url="https://www.suse.com/security/cve/CVE-2025-39840/" source="CVE"/>
		<reference ref_id="CVE-2025-39883" ref_url="https://www.suse.com/security/cve/CVE-2025-39883/" source="CVE"/>
		<reference ref_id="CVE-2025-40240" ref_url="https://www.suse.com/security/cve/CVE-2025-40240/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0445.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0445.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39806/">CVE-2025-39806 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39806">CVE-2025-39806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39840/">CVE-2025-39840 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39840">CVE-2025-39840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39883/">CVE-2025-39883 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39883">CVE-2025-39883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40240/">CVE-2025-40240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40240">CVE-2025-40240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054600" comment="kernel-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054601" comment="kernel-abi-stablelists-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054602" comment="kernel-core-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054603" comment="kernel-cross-headers-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054604" comment="kernel-debug-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054605" comment="kernel-debug-core-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054606" comment="kernel-debug-modules-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054607" comment="kernel-debug-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054608" comment="kernel-debug-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054609" comment="kernel-debug-uki-virt-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054610" comment="kernel-doc-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054611" comment="kernel-headers-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054612" comment="kernel-modules-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054613" comment="kernel-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054614" comment="kernel-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054615" comment="kernel-rt-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054616" comment="kernel-rt-core-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054617" comment="kernel-rt-debug-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054618" comment="kernel-rt-debug-core-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054619" comment="kernel-rt-debug-modules-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054620" comment="kernel-rt-debug-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054621" comment="kernel-rt-debug-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054622" comment="kernel-rt-modules-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054623" comment="kernel-rt-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054624" comment="kernel-rt-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054625" comment="kernel-tools-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054626" comment="kernel-tools-libs-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054627" comment="kernel-uki-virt-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054628" comment="kernel-uki-virt-addons-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054629" comment="libperf-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054630" comment="perf-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054631" comment="python3-perf-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054632" comment="rtla-5.14.0-611.20.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054633" comment="rv-5.14.0-611.20.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4870" version="1" class="patch">
	<metadata>
		<title>security update for libpq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0458.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0458.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054634" comment="libpq-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054635" comment="libpq-devel-13.23-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4871" version="1" class="patch">
	<metadata>
		<title>security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0470.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0470.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054636" comment="podman-5.6.0-11.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054637" comment="podman-docker-5.6.0-11.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054638" comment="podman-plugins-5.6.0-11.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054639" comment="podman-remote-5.6.0-11.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054640" comment="podman-tests-5.6.0-11.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4872" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0491.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0491.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054641" comment="postgresql-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054642" comment="postgresql-contrib-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054643" comment="postgresql-docs-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054644" comment="postgresql-plperl-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054645" comment="postgresql-plpython3-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054646" comment="postgresql-pltcl-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054647" comment="postgresql-private-devel-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054648" comment="postgresql-private-libs-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054649" comment="postgresql-server-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054650" comment="postgresql-server-devel-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054651" comment="postgresql-static-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054652" comment="postgresql-test-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054653" comment="postgresql-test-rpm-macros-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054654" comment="postgresql-upgrade-13.23-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054655" comment="postgresql-upgrade-devel-13.23-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4873" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0492.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0492.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053988" comment="pg_repack-1.4.8-2.module+el9.5.0+22224+f5585c78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054656" comment="postgresql-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054657" comment="postgresql-contrib-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054658" comment="postgresql-docs-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054659" comment="postgresql-plperl-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054660" comment="postgresql-plpython3-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054661" comment="postgresql-pltcl-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054662" comment="postgresql-private-devel-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054663" comment="postgresql-private-libs-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054664" comment="postgresql-server-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054665" comment="postgresql-server-devel-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054666" comment="postgresql-static-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054667" comment="postgresql-test-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054668" comment="postgresql-test-rpm-macros-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054669" comment="postgresql-upgrade-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054670" comment="postgresql-upgrade-devel-15.15-2.module+el9.7.0+23785+f55bffc9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4874" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0493.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0493.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016335" comment="pg_repack-1.5.1-1.module+el9.6.0+22880+6b241eec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016336" comment="pgvector-0.6.2-2.module+el9.6.0+22979+c3d78d52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054671" comment="postgis-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054672" comment="postgis-client-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054673" comment="postgis-docs-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054674" comment="postgis-upgrade-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054675" comment="postgis-utils-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054676" comment="postgresql-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054677" comment="postgresql-contrib-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054678" comment="postgresql-docs-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054679" comment="postgresql-plperl-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054680" comment="postgresql-plpython3-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054681" comment="postgresql-pltcl-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054682" comment="postgresql-private-devel-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054683" comment="postgresql-private-libs-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054684" comment="postgresql-server-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054685" comment="postgresql-server-devel-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054686" comment="postgresql-static-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054687" comment="postgresql-test-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054688" comment="postgresql-test-rpm-macros-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054689" comment="postgresql-upgrade-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054690" comment="postgresql-upgrade-devel-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4875" version="1" class="patch">
	<metadata>
		<title>security update for vsftpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-14242" ref_url="https://www.suse.com/security/cve/CVE-2025-14242/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0605.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0605.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14242/">CVE-2025-14242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14242">CVE-2025-14242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054691" comment="vsftpd-3.0.5-6.el9_7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4876" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-14327" ref_url="https://www.suse.com/security/cve/CVE-2025-14327/" source="CVE"/>
		<reference ref_id="CVE-2026-0877" ref_url="https://www.suse.com/security/cve/CVE-2026-0877/" source="CVE"/>
		<reference ref_id="CVE-2026-0878" ref_url="https://www.suse.com/security/cve/CVE-2026-0878/" source="CVE"/>
		<reference ref_id="CVE-2026-0879" ref_url="https://www.suse.com/security/cve/CVE-2026-0879/" source="CVE"/>
		<reference ref_id="CVE-2026-0880" ref_url="https://www.suse.com/security/cve/CVE-2026-0880/" source="CVE"/>
		<reference ref_id="CVE-2026-0882" ref_url="https://www.suse.com/security/cve/CVE-2026-0882/" source="CVE"/>
		<reference ref_id="CVE-2026-0883" ref_url="https://www.suse.com/security/cve/CVE-2026-0883/" source="CVE"/>
		<reference ref_id="CVE-2026-0884" ref_url="https://www.suse.com/security/cve/CVE-2026-0884/" source="CVE"/>
		<reference ref_id="CVE-2026-0885" ref_url="https://www.suse.com/security/cve/CVE-2026-0885/" source="CVE"/>
		<reference ref_id="CVE-2026-0886" ref_url="https://www.suse.com/security/cve/CVE-2026-0886/" source="CVE"/>
		<reference ref_id="CVE-2026-0887" ref_url="https://www.suse.com/security/cve/CVE-2026-0887/" source="CVE"/>
		<reference ref_id="CVE-2026-0890" ref_url="https://www.suse.com/security/cve/CVE-2026-0890/" source="CVE"/>
		<reference ref_id="CVE-2026-0891" ref_url="https://www.suse.com/security/cve/CVE-2026-0891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0694.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0694.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14327/">CVE-2025-14327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14327">CVE-2025-14327 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0877/">CVE-2026-0877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0877">CVE-2026-0877 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-0878/">CVE-2026-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0878">CVE-2026-0878 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0879/">CVE-2026-0879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0879">CVE-2026-0879 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0880/">CVE-2026-0880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0880">CVE-2026-0880 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0882/">CVE-2026-0882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0882">CVE-2026-0882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0883/">CVE-2026-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0883">CVE-2026-0883 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0884/">CVE-2026-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0884">CVE-2026-0884 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0885/">CVE-2026-0885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0885">CVE-2026-0885 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0886/">CVE-2026-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0886">CVE-2026-0886 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0887/">CVE-2026-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0887">CVE-2026-0887 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0890/">CVE-2026-0890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0890">CVE-2026-0890 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0891/">CVE-2026-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0891">CVE-2026-0891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4877" version="1" class="patch">
	<metadata>
		<title>security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-68615" ref_url="https://www.suse.com/security/cve/CVE-2025-68615/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0696.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0696.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68615/">CVE-2025-68615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68615">CVE-2025-68615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054694" comment="net-snmp-5.9.1-17.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054695" comment="net-snmp-agent-libs-5.9.1-17.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054696" comment="net-snmp-devel-5.9.1-17.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054697" comment="net-snmp-libs-5.9.1-17.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054698" comment="net-snmp-perl-5.9.1-17.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054699" comment="net-snmp-utils-5.9.1-17.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054700" comment="python3-net-snmp-5.9.1-17.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4878" version="1" class="patch">
	<metadata>
		<title>security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-46397" ref_url="https://www.suse.com/security/cve/CVE-2025-46397/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0700.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0700.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46397/">CVE-2025-46397 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46397">CVE-2025-46397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054701" comment="transfig-3.2.7b-11.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4879" version="1" class="patch">
	<metadata>
		<title>security update for gnupg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-68973" ref_url="https://www.suse.com/security/cve/CVE-2025-68973/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0719.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0719.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-68973/">CVE-2025-68973 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68973">CVE-2025-68973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054702" comment="gnupg2-2.3.3-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054703" comment="gnupg2-smime-2.3.3-5.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4880" version="1" class="patch">
	<metadata>
		<title>security update for jmc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-66566" ref_url="https://www.suse.com/security/cve/CVE-2025-66566/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0752.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0752.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-66566/">CVE-2025-66566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66566">CVE-2025-66566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054704" comment="jmc-8.2.0-18.el9_7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4881" version="1" class="patch">
	<metadata>
		<title>security update for gpsd-minimal (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-67268" ref_url="https://www.suse.com/security/cve/CVE-2025-67268/" source="CVE"/>
		<reference ref_id="CVE-2025-67269" ref_url="https://www.suse.com/security/cve/CVE-2025-67269/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0771.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0771.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-67268/">CVE-2025-67268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67268">CVE-2025-67268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-67269/">CVE-2025-67269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67269">CVE-2025-67269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054705" comment="gpsd-minimal-3.26.1-1.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054706" comment="gpsd-minimal-clients-3.26.1-1.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4882" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-38703" ref_url="https://www.suse.com/security/cve/CVE-2025-38703/" source="CVE"/>
		<reference ref_id="CVE-2025-39933" ref_url="https://www.suse.com/security/cve/CVE-2025-39933/" source="CVE"/>
		<reference ref_id="CVE-2025-40277" ref_url="https://www.suse.com/security/cve/CVE-2025-40277/" source="CVE"/>
		<reference ref_id="CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285/" source="CVE"/>
		<reference ref_id="CVE-2025-68287" ref_url="https://www.suse.com/security/cve/CVE-2025-68287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0793.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0793.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38703/">CVE-2025-38703 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38703">CVE-2025-38703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39933/">CVE-2025-39933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39933">CVE-2025-39933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40277/">CVE-2025-40277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40277">CVE-2025-40277 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68287/">CVE-2025-68287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68287">CVE-2025-68287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054707" comment="kernel-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054708" comment="kernel-abi-stablelists-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054709" comment="kernel-core-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054710" comment="kernel-cross-headers-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054711" comment="kernel-debug-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054712" comment="kernel-debug-core-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054713" comment="kernel-debug-modules-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054714" comment="kernel-debug-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054715" comment="kernel-debug-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054716" comment="kernel-debug-uki-virt-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054717" comment="kernel-doc-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054718" comment="kernel-headers-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054719" comment="kernel-modules-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054720" comment="kernel-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054721" comment="kernel-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054722" comment="kernel-rt-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054723" comment="kernel-rt-core-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054724" comment="kernel-rt-debug-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054725" comment="kernel-rt-debug-core-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054726" comment="kernel-rt-debug-modules-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054727" comment="kernel-rt-debug-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054728" comment="kernel-rt-debug-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054729" comment="kernel-rt-modules-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054730" comment="kernel-rt-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054731" comment="kernel-rt-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054732" comment="kernel-tools-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054733" comment="kernel-tools-libs-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054734" comment="kernel-uki-virt-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054735" comment="kernel-uki-virt-addons-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054736" comment="libperf-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054737" comment="perf-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054738" comment="python3-perf-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054739" comment="rtla-5.14.0-611.24.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054740" comment="rv-5.14.0-611.24.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4883" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0847.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0847.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053475" comment="java-11-openjdk-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043334" comment="java-11-openjdk-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053476" comment="java-11-openjdk-demo-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043336" comment="java-11-openjdk-demo-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053477" comment="java-11-openjdk-demo-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053478" comment="java-11-openjdk-demo-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053479" comment="java-11-openjdk-devel-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043340" comment="java-11-openjdk-devel-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053480" comment="java-11-openjdk-devel-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053481" comment="java-11-openjdk-devel-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053482" comment="java-11-openjdk-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053483" comment="java-11-openjdk-headless-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043345" comment="java-11-openjdk-headless-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053484" comment="java-11-openjdk-headless-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053485" comment="java-11-openjdk-headless-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053486" comment="java-11-openjdk-javadoc-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043349" comment="java-11-openjdk-javadoc-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053487" comment="java-11-openjdk-javadoc-zip-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043351" comment="java-11-openjdk-javadoc-zip-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053488" comment="java-11-openjdk-jmods-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043353" comment="java-11-openjdk-jmods-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053489" comment="java-11-openjdk-jmods-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053490" comment="java-11-openjdk-jmods-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053491" comment="java-11-openjdk-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053492" comment="java-11-openjdk-src-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043358" comment="java-11-openjdk-src-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053493" comment="java-11-openjdk-src-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053494" comment="java-11-openjdk-src-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053495" comment="java-11-openjdk-static-libs-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043362" comment="java-11-openjdk-static-libs-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053496" comment="java-11-openjdk-static-libs-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053497" comment="java-11-openjdk-static-libs-slowdebug-11.0.30.0.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4884" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-14422" ref_url="https://www.suse.com/security/cve/CVE-2025-14422/" source="CVE"/>
		<reference ref_id="CVE-2025-14423" ref_url="https://www.suse.com/security/cve/CVE-2025-14423/" source="CVE"/>
		<reference ref_id="CVE-2025-14424" ref_url="https://www.suse.com/security/cve/CVE-2025-14424/" source="CVE"/>
		<reference ref_id="CVE-2025-14425" ref_url="https://www.suse.com/security/cve/CVE-2025-14425/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0914.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0914.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14422/">CVE-2025-14422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14422">CVE-2025-14422 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14423/">CVE-2025-14423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14423">CVE-2025-14423 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14424/">CVE-2025-14424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14424">CVE-2025-14424 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14425/">CVE-2025-14425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14425">CVE-2025-14425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054741" comment="gimp-3.0.4-1.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054742" comment="gimp-libs-3.0.4-1.el9_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4885" version="1" class="patch">
	<metadata>
		<title>security update for golang (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0923.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0923.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054743" comment="go-toolset-1.25.5-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054744" comment="golang-1.25.5-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054745" comment="golang-bin-1.25.5-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054746" comment="golang-docs-1.25.5-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054747" comment="golang-misc-1.25.5-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054748" comment="golang-race-1.25.5-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054749" comment="golang-src-1.25.5-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054750" comment="golang-tests-1.25.5-2.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4886" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-14327" ref_url="https://www.suse.com/security/cve/CVE-2025-14327/" source="CVE"/>
		<reference ref_id="CVE-2026-0877" ref_url="https://www.suse.com/security/cve/CVE-2026-0877/" source="CVE"/>
		<reference ref_id="CVE-2026-0878" ref_url="https://www.suse.com/security/cve/CVE-2026-0878/" source="CVE"/>
		<reference ref_id="CVE-2026-0879" ref_url="https://www.suse.com/security/cve/CVE-2026-0879/" source="CVE"/>
		<reference ref_id="CVE-2026-0880" ref_url="https://www.suse.com/security/cve/CVE-2026-0880/" source="CVE"/>
		<reference ref_id="CVE-2026-0882" ref_url="https://www.suse.com/security/cve/CVE-2026-0882/" source="CVE"/>
		<reference ref_id="CVE-2026-0883" ref_url="https://www.suse.com/security/cve/CVE-2026-0883/" source="CVE"/>
		<reference ref_id="CVE-2026-0884" ref_url="https://www.suse.com/security/cve/CVE-2026-0884/" source="CVE"/>
		<reference ref_id="CVE-2026-0885" ref_url="https://www.suse.com/security/cve/CVE-2026-0885/" source="CVE"/>
		<reference ref_id="CVE-2026-0886" ref_url="https://www.suse.com/security/cve/CVE-2026-0886/" source="CVE"/>
		<reference ref_id="CVE-2026-0887" ref_url="https://www.suse.com/security/cve/CVE-2026-0887/" source="CVE"/>
		<reference ref_id="CVE-2026-0890" ref_url="https://www.suse.com/security/cve/CVE-2026-0890/" source="CVE"/>
		<reference ref_id="CVE-2026-0891" ref_url="https://www.suse.com/security/cve/CVE-2026-0891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0924.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0924.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14327/">CVE-2025-14327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14327">CVE-2025-14327 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0877/">CVE-2026-0877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0877">CVE-2026-0877 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-0878/">CVE-2026-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0878">CVE-2026-0878 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0879/">CVE-2026-0879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0879">CVE-2026-0879 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0880/">CVE-2026-0880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0880">CVE-2026-0880 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0882/">CVE-2026-0882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0882">CVE-2026-0882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0883/">CVE-2026-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0883">CVE-2026-0883 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0884/">CVE-2026-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0884">CVE-2026-0884 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0885/">CVE-2026-0885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0885">CVE-2026-0885 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0886/">CVE-2026-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0886">CVE-2026-0886 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0887/">CVE-2026-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0887">CVE-2026-0887 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0890/">CVE-2026-0890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0890">CVE-2026-0890 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0891/">CVE-2026-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0891">CVE-2026-0891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4887" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0927.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0927.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039028" comment="java-17-openjdk-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039029" comment="java-17-openjdk-demo-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039030" comment="java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039031" comment="java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039032" comment="java-17-openjdk-devel-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039033" comment="java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039034" comment="java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039035" comment="java-17-openjdk-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039036" comment="java-17-openjdk-headless-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039037" comment="java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039038" comment="java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039039" comment="java-17-openjdk-javadoc-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039040" comment="java-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039041" comment="java-17-openjdk-jmods-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039042" comment="java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039043" comment="java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039044" comment="java-17-openjdk-slowdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039045" comment="java-17-openjdk-src-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039046" comment="java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039047" comment="java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039048" comment="java-17-openjdk-static-libs-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039049" comment="java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039050" comment="java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4888" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0928.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0928.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039592" comment="java-21-openjdk-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039593" comment="java-21-openjdk-demo-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039594" comment="java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039595" comment="java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039596" comment="java-21-openjdk-devel-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039597" comment="java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039598" comment="java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039599" comment="java-21-openjdk-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039600" comment="java-21-openjdk-headless-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039601" comment="java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039602" comment="java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039603" comment="java-21-openjdk-javadoc-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039604" comment="java-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039605" comment="java-21-openjdk-jmods-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039606" comment="java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039607" comment="java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039608" comment="java-21-openjdk-slowdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039609" comment="java-21-openjdk-src-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039610" comment="java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039611" comment="java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039612" comment="java-21-openjdk-static-libs-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039613" comment="java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039614" comment="java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4889" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0932.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0932.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040212" comment="java-1.8.0-openjdk-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040213" comment="java-1.8.0-openjdk-accessibility-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040214" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040215" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040216" comment="java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040217" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040218" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040219" comment="java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040220" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040221" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040222" comment="java-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040223" comment="java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040224" comment="java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040225" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040226" comment="java-1.8.0-openjdk-src-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040227" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040228" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4890" version="1" class="patch">
	<metadata>
		<title>security update for java-25-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0933.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0933.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054752" comment="java-25-openjdk-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054753" comment="java-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054754" comment="java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054755" comment="java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054756" comment="java-25-openjdk-demo-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054757" comment="java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054758" comment="java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054759" comment="java-25-openjdk-devel-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054760" comment="java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054761" comment="java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054762" comment="java-25-openjdk-fastdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054763" comment="java-25-openjdk-headless-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054764" comment="java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054765" comment="java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054766" comment="java-25-openjdk-javadoc-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054767" comment="java-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054768" comment="java-25-openjdk-jmods-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054769" comment="java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054770" comment="java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054771" comment="java-25-openjdk-slowdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054772" comment="java-25-openjdk-src-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054773" comment="java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054774" comment="java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054775" comment="java-25-openjdk-static-libs-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054776" comment="java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054777" comment="java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4891" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-13601" ref_url="https://www.suse.com/security/cve/CVE-2025-13601/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0936.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0936.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13601/">CVE-2025-13601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13601">CVE-2025-13601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054778" comment="glib2-2.68.4-18.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054779" comment="glib2-devel-2.68.4-18.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054780" comment="glib2-doc-2.68.4-18.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054781" comment="glib2-static-2.68.4-18.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054782" comment="glib2-tests-2.68.4-18.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4892" version="1" class="patch">
	<metadata>
		<title>security update for python-urllib3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1087.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1087.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054783" comment="python3-urllib3-1.26.5-6.el9_7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4893" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-urllib3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1088.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1088.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054784" comment="python3.12-urllib3-1.26.19-1.el9_7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4894" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-urllib3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1089.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1089.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054785" comment="python3.11-urllib3-1.26.12-5.el9_7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4895" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-38141" ref_url="https://www.suse.com/security/cve/CVE-2025-38141/" source="CVE"/>
		<reference ref_id="CVE-2025-38349" ref_url="https://www.suse.com/security/cve/CVE-2025-38349/" source="CVE"/>
		<reference ref_id="CVE-2025-38731" ref_url="https://www.suse.com/security/cve/CVE-2025-38731/" source="CVE"/>
		<reference ref_id="CVE-2025-40248" ref_url="https://www.suse.com/security/cve/CVE-2025-40248/" source="CVE"/>
		<reference ref_id="CVE-2025-40258" ref_url="https://www.suse.com/security/cve/CVE-2025-40258/" source="CVE"/>
		<reference ref_id="CVE-2025-40294" ref_url="https://www.suse.com/security/cve/CVE-2025-40294/" source="CVE"/>
		<reference ref_id="CVE-2025-68301" ref_url="https://www.suse.com/security/cve/CVE-2025-68301/" source="CVE"/>
		<reference ref_id="CVE-2025-68305" ref_url="https://www.suse.com/security/cve/CVE-2025-68305/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1143.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1143.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38141/">CVE-2025-38141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38141">CVE-2025-38141 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38349/">CVE-2025-38349 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38349">CVE-2025-38349 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38731/">CVE-2025-38731 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38731">CVE-2025-38731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40248/">CVE-2025-40248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40248">CVE-2025-40248 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40258/">CVE-2025-40258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40294/">CVE-2025-40294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40294">CVE-2025-40294 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68301/">CVE-2025-68301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68301">CVE-2025-68301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68305/">CVE-2025-68305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68305">CVE-2025-68305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054786" comment="kernel-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054787" comment="kernel-abi-stablelists-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054788" comment="kernel-core-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054789" comment="kernel-cross-headers-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054790" comment="kernel-debug-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054791" comment="kernel-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054792" comment="kernel-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054793" comment="kernel-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054794" comment="kernel-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054795" comment="kernel-debug-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054796" comment="kernel-doc-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054797" comment="kernel-headers-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054798" comment="kernel-modules-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054799" comment="kernel-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054800" comment="kernel-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054801" comment="kernel-rt-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054802" comment="kernel-rt-core-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054803" comment="kernel-rt-debug-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054804" comment="kernel-rt-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054805" comment="kernel-rt-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054806" comment="kernel-rt-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054807" comment="kernel-rt-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054808" comment="kernel-rt-modules-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054809" comment="kernel-rt-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054810" comment="kernel-rt-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054811" comment="kernel-tools-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054812" comment="kernel-tools-libs-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054813" comment="kernel-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054814" comment="kernel-uki-virt-addons-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054815" comment="libperf-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054816" comment="perf-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054817" comment="python3-perf-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054818" comment="rtla-5.14.0-611.26.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054819" comment="rv-5.14.0-611.26.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4896" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1239.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1239.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054820" comment="fence-agents-aliyun-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054821" comment="fence-agents-all-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054822" comment="fence-agents-amt-ws-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054823" comment="fence-agents-apc-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054824" comment="fence-agents-apc-snmp-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054825" comment="fence-agents-aws-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054826" comment="fence-agents-azure-arm-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054827" comment="fence-agents-bladecenter-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054828" comment="fence-agents-brocade-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054829" comment="fence-agents-cisco-mds-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054830" comment="fence-agents-cisco-ucs-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054831" comment="fence-agents-common-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054832" comment="fence-agents-compute-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054833" comment="fence-agents-drac5-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054834" comment="fence-agents-eaton-snmp-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054835" comment="fence-agents-emerson-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054836" comment="fence-agents-eps-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054837" comment="fence-agents-gce-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054838" comment="fence-agents-heuristics-ping-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054839" comment="fence-agents-hpblade-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054840" comment="fence-agents-ibm-powervs-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054841" comment="fence-agents-ibm-vpc-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054842" comment="fence-agents-ibmblade-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054843" comment="fence-agents-ifmib-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054844" comment="fence-agents-ilo-moonshot-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054845" comment="fence-agents-ilo-mp-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054846" comment="fence-agents-ilo-ssh-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054847" comment="fence-agents-ilo2-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054848" comment="fence-agents-intelmodular-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054849" comment="fence-agents-ipdu-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054850" comment="fence-agents-ipmilan-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054851" comment="fence-agents-kdump-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054852" comment="fence-agents-kubevirt-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054853" comment="fence-agents-lpar-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054854" comment="fence-agents-mpath-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054855" comment="fence-agents-nutanix-ahv-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054856" comment="fence-agents-openstack-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054857" comment="fence-agents-redfish-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054858" comment="fence-agents-rhevm-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054859" comment="fence-agents-rsa-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054860" comment="fence-agents-rsb-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054861" comment="fence-agents-sbd-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054862" comment="fence-agents-scsi-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054863" comment="fence-agents-virsh-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054864" comment="fence-agents-vmware-rest-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054865" comment="fence-agents-vmware-soap-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054866" comment="fence-agents-wti-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054867" comment="fence-virt-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054868" comment="fence-virtd-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054869" comment="fence-virtd-cpg-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054870" comment="fence-virtd-libvirt-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054871" comment="fence-virtd-multicast-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054872" comment="fence-virtd-serial-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054873" comment="fence-virtd-tcp-4.10.0-98.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054874" comment="ha-cloud-support-4.10.0-98.el9_7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4897" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-9086" ref_url="https://www.suse.com/security/cve/CVE-2025-9086/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1350.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1350.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9086/">CVE-2025-9086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9086">CVE-2025-9086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054875" comment="curl-7.76.1-35.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054876" comment="curl-minimal-7.76.1-35.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054877" comment="libcurl-7.76.1-35.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054878" comment="libcurl-devel-7.76.1-35.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054879" comment="libcurl-minimal-7.76.1-35.el9_7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4898" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-15-binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-11083" ref_url="https://www.suse.com/security/cve/CVE-2025-11083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1359.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1359.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11083/">CVE-2025-11083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11083">CVE-2025-11083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054880" comment="gcc-toolset-15-binutils-2.44-3.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054881" comment="gcc-toolset-15-binutils-devel-2.44-3.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054882" comment="gcc-toolset-15-binutils-gold-2.44-3.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054883" comment="gcc-toolset-15-binutils-gprofng-2.44-3.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4899" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1408.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1408.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054884" comment="python3.12-3.12.12-4.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054885" comment="python3.12-debug-3.12.12-4.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054886" comment="python3.12-devel-3.12.12-4.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054887" comment="python3.12-idle-3.12.12-4.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054888" comment="python3.12-libs-3.12.12-4.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054889" comment="python3.12-test-3.12.12-4.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054890" comment="python3.12-tkinter-3.12.12-4.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4900" version="1" class="patch">
	<metadata>
		<title>security update for php (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-1220" ref_url="https://www.suse.com/security/cve/CVE-2025-1220/" source="CVE"/>
		<reference ref_id="CVE-2025-14177" ref_url="https://www.suse.com/security/cve/CVE-2025-14177/" source="CVE"/>
		<reference ref_id="CVE-2025-14178" ref_url="https://www.suse.com/security/cve/CVE-2025-14178/" source="CVE"/>
		<reference ref_id="CVE-2025-14180" ref_url="https://www.suse.com/security/cve/CVE-2025-14180/" source="CVE"/>
		<reference ref_id="CVE-2025-1735" ref_url="https://www.suse.com/security/cve/CVE-2025-1735/" source="CVE"/>
		<reference ref_id="CVE-2025-6491" ref_url="https://www.suse.com/security/cve/CVE-2025-6491/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1409.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1409.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1220/">CVE-2025-1220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1220">CVE-2025-1220 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14177/">CVE-2025-14177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14177">CVE-2025-14177 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14178/">CVE-2025-14178 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14178">CVE-2025-14178 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14180/">CVE-2025-14180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14180">CVE-2025-14180 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1735/">CVE-2025-1735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1735">CVE-2025-1735 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6491/">CVE-2025-6491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6491">CVE-2025-6491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957467" comment="apcu-panel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054891" comment="php-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054892" comment="php-bcmath-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054893" comment="php-cli-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054894" comment="php-common-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054895" comment="php-dba-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054896" comment="php-dbg-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054897" comment="php-devel-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054898" comment="php-embedded-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054899" comment="php-enchant-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054900" comment="php-ffi-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054901" comment="php-fpm-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054902" comment="php-gd-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054903" comment="php-gmp-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054904" comment="php-intl-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054905" comment="php-ldap-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054906" comment="php-mbstring-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054907" comment="php-mysqlnd-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054908" comment="php-odbc-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054909" comment="php-opcache-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054910" comment="php-pdo-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957488" comment="php-pecl-apcu-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957489" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957490" comment="php-pecl-rrd-2.0.3-4.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957491" comment="php-pecl-xdebug3-3.2.2-2.module+el9.4.0+20796+bd4564df is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957492" comment="php-pecl-zip-1.22.3-1.module+el9.4.0+20748+b46899d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054911" comment="php-pgsql-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054912" comment="php-process-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054913" comment="php-snmp-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054914" comment="php-soap-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054915" comment="php-xml-8.2.30-1.module+el9.7.0+23849+7b831f17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4901" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1410.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1410.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054916" comment="python3.11-3.11.13-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054917" comment="python3.11-debug-3.11.13-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054918" comment="python3.11-devel-3.11.13-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054919" comment="python3.11-idle-3.11.13-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054920" comment="python3.11-libs-3.11.13-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054921" comment="python3.11-test-3.11.13-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054922" comment="python3.11-tkinter-3.11.13-5.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4902" version="1" class="patch">
	<metadata>
		<title>security update for php (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-14177" ref_url="https://www.suse.com/security/cve/CVE-2025-14177/" source="CVE"/>
		<reference ref_id="CVE-2025-14178" ref_url="https://www.suse.com/security/cve/CVE-2025-14178/" source="CVE"/>
		<reference ref_id="CVE-2025-14180" ref_url="https://www.suse.com/security/cve/CVE-2025-14180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1429.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1429.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14177/">CVE-2025-14177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14177">CVE-2025-14177 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14178/">CVE-2025-14178 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14178">CVE-2025-14178 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14180/">CVE-2025-14180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14180">CVE-2025-14180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054923" comment="php-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054924" comment="php-bcmath-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054925" comment="php-cli-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054926" comment="php-common-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054927" comment="php-dba-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054928" comment="php-dbg-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054929" comment="php-devel-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054930" comment="php-embedded-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054931" comment="php-enchant-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054932" comment="php-ffi-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054933" comment="php-fpm-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054934" comment="php-gd-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054935" comment="php-gmp-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054936" comment="php-intl-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054937" comment="php-ldap-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054938" comment="php-mbstring-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054939" comment="php-mysqlnd-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054940" comment="php-odbc-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054941" comment="php-opcache-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054942" comment="php-pdo-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054943" comment="php-pgsql-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054944" comment="php-process-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054945" comment="php-snmp-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054946" comment="php-soap-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054947" comment="php-xml-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4903" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-11187" ref_url="https://www.suse.com/security/cve/CVE-2025-11187/" source="CVE"/>
		<reference ref_id="CVE-2025-15467" ref_url="https://www.suse.com/security/cve/CVE-2025-15467/" source="CVE"/>
		<reference ref_id="CVE-2025-15468" ref_url="https://www.suse.com/security/cve/CVE-2025-15468/" source="CVE"/>
		<reference ref_id="CVE-2025-15469" ref_url="https://www.suse.com/security/cve/CVE-2025-15469/" source="CVE"/>
		<reference ref_id="CVE-2025-66199" ref_url="https://www.suse.com/security/cve/CVE-2025-66199/" source="CVE"/>
		<reference ref_id="CVE-2025-68160" ref_url="https://www.suse.com/security/cve/CVE-2025-68160/" source="CVE"/>
		<reference ref_id="CVE-2025-69418" ref_url="https://www.suse.com/security/cve/CVE-2025-69418/" source="CVE"/>
		<reference ref_id="CVE-2025-69419" ref_url="https://www.suse.com/security/cve/CVE-2025-69419/" source="CVE"/>
		<reference ref_id="CVE-2025-69420" ref_url="https://www.suse.com/security/cve/CVE-2025-69420/" source="CVE"/>
		<reference ref_id="CVE-2025-69421" ref_url="https://www.suse.com/security/cve/CVE-2025-69421/" source="CVE"/>
		<reference ref_id="CVE-2026-22795" ref_url="https://www.suse.com/security/cve/CVE-2026-22795/" source="CVE"/>
		<reference ref_id="CVE-2026-22796" ref_url="https://www.suse.com/security/cve/CVE-2026-22796/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1473.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1473.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11187/">CVE-2025-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11187">CVE-2025-11187 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15467/">CVE-2025-15467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15467">CVE-2025-15467 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15468/">CVE-2025-15468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15468">CVE-2025-15468 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15469/">CVE-2025-15469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15469">CVE-2025-15469 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66199/">CVE-2025-66199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66199">CVE-2025-66199 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68160/">CVE-2025-68160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68160">CVE-2025-68160 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69418/">CVE-2025-69418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69418">CVE-2025-69418 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69419/">CVE-2025-69419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69419">CVE-2025-69419 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69420/">CVE-2025-69420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69420">CVE-2025-69420 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69421/">CVE-2025-69421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69421">CVE-2025-69421 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22795/">CVE-2026-22795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22795">CVE-2026-22795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-22796/">CVE-2026-22796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22796">CVE-2026-22796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054948" comment="openssl-3.5.1-7.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054949" comment="openssl-devel-3.5.1-7.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054950" comment="openssl-libs-3.5.1-7.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054951" comment="openssl-perl-3.5.1-7.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4904" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1478.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1478.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054952" comment="python-unversioned-command-3.9.25-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054953" comment="python3-3.9.25-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054954" comment="python3-debug-3.9.25-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054955" comment="python3-devel-3.9.25-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054956" comment="python3-idle-3.9.25-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054957" comment="python3-libs-3.9.25-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054958" comment="python3-test-3.9.25-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054959" comment="python3-tkinter-3.9.25-3.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4905" version="1" class="patch">
	<metadata>
		<title>security update for iperf3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-54349" ref_url="https://www.suse.com/security/cve/CVE-2025-54349/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1595.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1595.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-54349/">CVE-2025-54349 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54349">CVE-2025-54349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054960" comment="iperf3-3.9-14.el9_7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4906" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-38568" ref_url="https://www.suse.com/security/cve/CVE-2025-38568/" source="CVE"/>
		<reference ref_id="CVE-2025-40154" ref_url="https://www.suse.com/security/cve/CVE-2025-40154/" source="CVE"/>
		<reference ref_id="CVE-2025-40251" ref_url="https://www.suse.com/security/cve/CVE-2025-40251/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1617.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1617.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38568/">CVE-2025-38568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38568">CVE-2025-38568 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40154/">CVE-2025-40154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40154">CVE-2025-40154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40251/">CVE-2025-40251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40251">CVE-2025-40251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054961" comment="kernel-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054962" comment="kernel-abi-stablelists-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054963" comment="kernel-core-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054964" comment="kernel-cross-headers-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054965" comment="kernel-debug-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054966" comment="kernel-debug-core-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054967" comment="kernel-debug-modules-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054968" comment="kernel-debug-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054969" comment="kernel-debug-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054970" comment="kernel-debug-uki-virt-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054971" comment="kernel-doc-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054972" comment="kernel-headers-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054973" comment="kernel-modules-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054974" comment="kernel-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054975" comment="kernel-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054976" comment="kernel-rt-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054977" comment="kernel-rt-core-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054978" comment="kernel-rt-debug-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054979" comment="kernel-rt-debug-core-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054980" comment="kernel-rt-debug-modules-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054981" comment="kernel-rt-debug-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054982" comment="kernel-rt-debug-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054983" comment="kernel-rt-modules-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054984" comment="kernel-rt-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054985" comment="kernel-rt-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054986" comment="kernel-tools-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054987" comment="kernel-tools-libs-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054988" comment="kernel-uki-virt-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054989" comment="kernel-uki-virt-addons-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054990" comment="libperf-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054991" comment="perf-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054992" comment="python3-perf-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054993" comment="rtla-5.14.0-611.27.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054994" comment="rv-5.14.0-611.27.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4907" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-23490" ref_url="https://www.suse.com/security/cve/CVE-2026-23490/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1903.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1903.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23490/">CVE-2026-23490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23490">CVE-2026-23490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010054995" comment="fence-agents-aliyun-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054996" comment="fence-agents-all-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054997" comment="fence-agents-amt-ws-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054998" comment="fence-agents-apc-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054999" comment="fence-agents-apc-snmp-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055000" comment="fence-agents-aws-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055001" comment="fence-agents-azure-arm-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055002" comment="fence-agents-bladecenter-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055003" comment="fence-agents-brocade-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055004" comment="fence-agents-cisco-mds-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055005" comment="fence-agents-cisco-ucs-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055006" comment="fence-agents-common-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055007" comment="fence-agents-compute-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055008" comment="fence-agents-drac5-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055009" comment="fence-agents-eaton-snmp-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055010" comment="fence-agents-emerson-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055011" comment="fence-agents-eps-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055012" comment="fence-agents-gce-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055013" comment="fence-agents-heuristics-ping-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055014" comment="fence-agents-hpblade-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055015" comment="fence-agents-ibm-powervs-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055016" comment="fence-agents-ibm-vpc-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055017" comment="fence-agents-ibmblade-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055018" comment="fence-agents-ifmib-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055019" comment="fence-agents-ilo-moonshot-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055020" comment="fence-agents-ilo-mp-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055021" comment="fence-agents-ilo-ssh-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055022" comment="fence-agents-ilo2-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055023" comment="fence-agents-intelmodular-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055024" comment="fence-agents-ipdu-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055025" comment="fence-agents-ipmilan-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055026" comment="fence-agents-kdump-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055027" comment="fence-agents-kubevirt-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055028" comment="fence-agents-lpar-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055029" comment="fence-agents-mpath-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055030" comment="fence-agents-nutanix-ahv-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055031" comment="fence-agents-openstack-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055032" comment="fence-agents-redfish-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055033" comment="fence-agents-rhevm-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055034" comment="fence-agents-rsa-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055035" comment="fence-agents-rsb-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055036" comment="fence-agents-sbd-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055037" comment="fence-agents-scsi-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055038" comment="fence-agents-virsh-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055039" comment="fence-agents-vmware-rest-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055040" comment="fence-agents-vmware-soap-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055041" comment="fence-agents-wti-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055042" comment="fence-virt-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055043" comment="fence-virtd-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055044" comment="fence-virtd-cpg-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055045" comment="fence-virtd-libvirt-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055046" comment="fence-virtd-multicast-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055047" comment="fence-virtd-serial-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055048" comment="fence-virtd-tcp-4.10.0-98.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055049" comment="ha-cloud-support-4.10.0-98.el9_7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4908" version="1" class="patch">
	<metadata>
		<title>security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-14104" ref_url="https://www.suse.com/security/cve/CVE-2025-14104/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1913.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1913.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14104/">CVE-2025-14104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14104">CVE-2025-14104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055050" comment="libblkid-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055051" comment="libblkid-devel-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055052" comment="libfdisk-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055053" comment="libfdisk-devel-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055054" comment="libmount-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055055" comment="libmount-devel-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055056" comment="libsmartcols-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055057" comment="libsmartcols-devel-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055058" comment="libuuid-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055059" comment="libuuid-devel-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055060" comment="python3-libmount-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055061" comment="util-linux-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055062" comment="util-linux-core-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055063" comment="util-linux-user-2.37.4-21.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055064" comment="uuidd-2.37.4-21.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4909" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-wheel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-24049" ref_url="https://www.suse.com/security/cve/CVE-2026-24049/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1939.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1939.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-24049/">CVE-2026-24049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24049">CVE-2026-24049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055065" comment="python3.12-wheel-0.41.2-3.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055066" comment="python3.12-wheel-wheel-0.41.2-3.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4910" version="1" class="patch">
	<metadata>
		<title>security update for fontforge (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-15269" ref_url="https://www.suse.com/security/cve/CVE-2025-15269/" source="CVE"/>
		<reference ref_id="CVE-2025-15275" ref_url="https://www.suse.com/security/cve/CVE-2025-15275/" source="CVE"/>
		<reference ref_id="CVE-2025-15279" ref_url="https://www.suse.com/security/cve/CVE-2025-15279/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2039.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2039.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15269/">CVE-2025-15269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15269">CVE-2025-15269 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15275/">CVE-2025-15275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15275">CVE-2025-15275 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15279/">CVE-2025-15279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15279">CVE-2025-15279 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055067" comment="fontforge-20201107-7.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4911" version="1" class="patch">
	<metadata>
		<title>security update for brotli (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-6176" ref_url="https://www.suse.com/security/cve/CVE-2025-6176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2042.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2042.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6176/">CVE-2025-6176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6176">CVE-2025-6176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055068" comment="brotli-1.0.9-9.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055069" comment="brotli-devel-1.0.9-9.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055070" comment="libbrotli-1.0.9-9.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055071" comment="python3-brotli-1.0.9-9.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4912" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-23530" ref_url="https://www.suse.com/security/cve/CVE-2026-23530/" source="CVE"/>
		<reference ref_id="CVE-2026-23531" ref_url="https://www.suse.com/security/cve/CVE-2026-23531/" source="CVE"/>
		<reference ref_id="CVE-2026-23532" ref_url="https://www.suse.com/security/cve/CVE-2026-23532/" source="CVE"/>
		<reference ref_id="CVE-2026-23533" ref_url="https://www.suse.com/security/cve/CVE-2026-23533/" source="CVE"/>
		<reference ref_id="CVE-2026-23534" ref_url="https://www.suse.com/security/cve/CVE-2026-23534/" source="CVE"/>
		<reference ref_id="CVE-2026-23883" ref_url="https://www.suse.com/security/cve/CVE-2026-23883/" source="CVE"/>
		<reference ref_id="CVE-2026-23884" ref_url="https://www.suse.com/security/cve/CVE-2026-23884/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2048.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2048.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23530/">CVE-2026-23530 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23530">CVE-2026-23530 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23531/">CVE-2026-23531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23531">CVE-2026-23531 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23532/">CVE-2026-23532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23532">CVE-2026-23532 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23533/">CVE-2026-23533 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23533">CVE-2026-23533 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23534/">CVE-2026-23534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23534">CVE-2026-23534 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23883/">CVE-2026-23883 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23883">CVE-2026-23883 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23884/">CVE-2026-23884 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23884">CVE-2026-23884 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055072" comment="freerdp-2.11.7-1.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055073" comment="freerdp-devel-2.11.7-1.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055074" comment="freerdp-libs-2.11.7-1.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055075" comment="libwinpr-2.11.7-1.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055076" comment="libwinpr-devel-2.11.7-1.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4913" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-37789" ref_url="https://www.suse.com/security/cve/CVE-2025-37789/" source="CVE"/>
		<reference ref_id="CVE-2025-37819" ref_url="https://www.suse.com/security/cve/CVE-2025-37819/" source="CVE"/>
		<reference ref_id="CVE-2025-38022" ref_url="https://www.suse.com/security/cve/CVE-2025-38022/" source="CVE"/>
		<reference ref_id="CVE-2025-38024" ref_url="https://www.suse.com/security/cve/CVE-2025-38024/" source="CVE"/>
		<reference ref_id="CVE-2025-38403" ref_url="https://www.suse.com/security/cve/CVE-2025-38403/" source="CVE"/>
		<reference ref_id="CVE-2025-38415" ref_url="https://www.suse.com/security/cve/CVE-2025-38415/" source="CVE"/>
		<reference ref_id="CVE-2025-38459" ref_url="https://www.suse.com/security/cve/CVE-2025-38459/" source="CVE"/>
		<reference ref_id="CVE-2025-38730" ref_url="https://www.suse.com/security/cve/CVE-2025-38730/" source="CVE"/>
		<reference ref_id="CVE-2025-39760" ref_url="https://www.suse.com/security/cve/CVE-2025-39760/" source="CVE"/>
		<reference ref_id="CVE-2025-40135" ref_url="https://www.suse.com/security/cve/CVE-2025-40135/" source="CVE"/>
		<reference ref_id="CVE-2025-40141" ref_url="https://www.suse.com/security/cve/CVE-2025-40141/" source="CVE"/>
		<reference ref_id="CVE-2025-40158" ref_url="https://www.suse.com/security/cve/CVE-2025-40158/" source="CVE"/>
		<reference ref_id="CVE-2025-40170" ref_url="https://www.suse.com/security/cve/CVE-2025-40170/" source="CVE"/>
		<reference ref_id="CVE-2025-40269" ref_url="https://www.suse.com/security/cve/CVE-2025-40269/" source="CVE"/>
		<reference ref_id="CVE-2025-40271" ref_url="https://www.suse.com/security/cve/CVE-2025-40271/" source="CVE"/>
		<reference ref_id="CVE-2025-40318" ref_url="https://www.suse.com/security/cve/CVE-2025-40318/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2212.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2212.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37789/">CVE-2025-37789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37789">CVE-2025-37789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37819/">CVE-2025-37819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37819">CVE-2025-37819 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38022/">CVE-2025-38022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38022">CVE-2025-38022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38024/">CVE-2025-38024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38024">CVE-2025-38024 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38403/">CVE-2025-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38403">CVE-2025-38403 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38415/">CVE-2025-38415 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38415">CVE-2025-38415 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38459/">CVE-2025-38459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38459">CVE-2025-38459 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38730/">CVE-2025-38730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38730">CVE-2025-38730 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39760/">CVE-2025-39760 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40135/">CVE-2025-40135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40135">CVE-2025-40135 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40141/">CVE-2025-40141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40141">CVE-2025-40141 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40158/">CVE-2025-40158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40158">CVE-2025-40158 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40170/">CVE-2025-40170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40170">CVE-2025-40170 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40269/">CVE-2025-40269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40269">CVE-2025-40269 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40271/">CVE-2025-40271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40271">CVE-2025-40271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40318/">CVE-2025-40318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40318">CVE-2025-40318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4914" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-0719" ref_url="https://www.suse.com/security/cve/CVE-2026-0719/" source="CVE"/>
		<reference ref_id="CVE-2026-1761" ref_url="https://www.suse.com/security/cve/CVE-2026-1761/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2216.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2216.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0719/">CVE-2026-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0719">CVE-2026-0719 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1761/">CVE-2026-1761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1761">CVE-2026-1761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055111" comment="libsoup-2.72.0-12.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055112" comment="libsoup-devel-2.72.0-12.el9_7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4915" version="1" class="patch">
	<metadata>
		<title>security update for keylime (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-1709" ref_url="https://www.suse.com/security/cve/CVE-2026-1709/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2224.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2224.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1709/">CVE-2026-1709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1709">CVE-2026-1709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055113" comment="keylime-7.12.1-11.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055114" comment="keylime-base-7.12.1-11.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055115" comment="keylime-registrar-7.12.1-11.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055116" comment="keylime-selinux-7.12.1-11.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055117" comment="keylime-tenant-7.12.1-11.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055118" comment="keylime-verifier-7.12.1-11.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055119" comment="python3-keylime-7.12.1-11.el9_7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4916" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2452.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2452.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055120" comment="pcs-0.11.10-1.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055121" comment="pcs-snmp-0.11.10-1.el9_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4917" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-15059" ref_url="https://www.suse.com/security/cve/CVE-2025-15059/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2707.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2707.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15059/">CVE-2025-15059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15059">CVE-2025-15059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055122" comment="gimp-3.0.4-1.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055123" comment="gimp-libs-3.0.4-1.el9_7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4918" version="1" class="patch">
	<metadata>
		<title>security update for golang (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-61732" ref_url="https://www.suse.com/security/cve/CVE-2025-61732/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2709.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2709.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-61732/">CVE-2025-61732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055124" comment="go-toolset-1.25.7-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055125" comment="golang-1.25.7-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055126" comment="golang-bin-1.25.7-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055127" comment="golang-docs-1.25.7-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055128" comment="golang-misc-1.25.7-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055129" comment="golang-race-1.25.7-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055130" comment="golang-src-1.25.7-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055131" comment="golang-tests-1.25.7-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4919" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-53034" ref_url="https://www.suse.com/security/cve/CVE-2023-53034/" source="CVE"/>
		<reference ref_id="CVE-2025-40064" ref_url="https://www.suse.com/security/cve/CVE-2025-40064/" source="CVE"/>
		<reference ref_id="CVE-2025-40304" ref_url="https://www.suse.com/security/cve/CVE-2025-40304/" source="CVE"/>
		<reference ref_id="CVE-2025-40322" ref_url="https://www.suse.com/security/cve/CVE-2025-40322/" source="CVE"/>
		<reference ref_id="CVE-2025-68349" ref_url="https://www.suse.com/security/cve/CVE-2025-68349/" source="CVE"/>
		<reference ref_id="CVE-2025-68811" ref_url="https://www.suse.com/security/cve/CVE-2025-68811/" source="CVE"/>
		<reference ref_id="CVE-2026-22998" ref_url="https://www.suse.com/security/cve/CVE-2026-22998/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2722.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2722.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53034/">CVE-2023-53034 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53034">CVE-2023-53034 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40064/">CVE-2025-40064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40064">CVE-2025-40064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40304/">CVE-2025-40304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40304">CVE-2025-40304 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40322/">CVE-2025-40322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40322">CVE-2025-40322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68349/">CVE-2025-68349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68349">CVE-2025-68349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68811/">CVE-2025-68811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68811">CVE-2025-68811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22998/">CVE-2026-22998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22998">CVE-2026-22998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055132" comment="kernel-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055133" comment="kernel-abi-stablelists-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055134" comment="kernel-core-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055135" comment="kernel-cross-headers-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055136" comment="kernel-debug-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055137" comment="kernel-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055138" comment="kernel-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055139" comment="kernel-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055140" comment="kernel-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055141" comment="kernel-debug-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055142" comment="kernel-doc-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055143" comment="kernel-headers-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055144" comment="kernel-modules-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055145" comment="kernel-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055146" comment="kernel-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055147" comment="kernel-rt-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055148" comment="kernel-rt-core-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055149" comment="kernel-rt-debug-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055150" comment="kernel-rt-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055151" comment="kernel-rt-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055152" comment="kernel-rt-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055153" comment="kernel-rt-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055154" comment="kernel-rt-modules-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055155" comment="kernel-rt-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055156" comment="kernel-rt-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055157" comment="kernel-tools-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055158" comment="kernel-tools-libs-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055159" comment="kernel-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055160" comment="kernel-uki-virt-addons-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055161" comment="libperf-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055162" comment="perf-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055163" comment="python3-perf-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055164" comment="rtla-5.14.0-611.34.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055165" comment="rv-5.14.0-611.34.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4920" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2776.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2776.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055166" comment="edk2-ovmf-20241117-4.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055167" comment="edk2-tools-20241117-4.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055168" comment="edk2-tools-doc-20241117-4.el9_7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4921" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-55130" ref_url="https://www.suse.com/security/cve/CVE-2025-55130/" source="CVE"/>
		<reference ref_id="CVE-2025-55131" ref_url="https://www.suse.com/security/cve/CVE-2025-55131/" source="CVE"/>
		<reference ref_id="CVE-2025-55132" ref_url="https://www.suse.com/security/cve/CVE-2025-55132/" source="CVE"/>
		<reference ref_id="CVE-2025-59465" ref_url="https://www.suse.com/security/cve/CVE-2025-59465/" source="CVE"/>
		<reference ref_id="CVE-2025-59466" ref_url="https://www.suse.com/security/cve/CVE-2025-59466/" source="CVE"/>
		<reference ref_id="CVE-2026-21637" ref_url="https://www.suse.com/security/cve/CVE-2026-21637/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2781.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2781.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55130/">CVE-2025-55130 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55130">CVE-2025-55130 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55131/">CVE-2025-55131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55131">CVE-2025-55131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55132/">CVE-2025-55132 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55132">CVE-2025-55132 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59465/">CVE-2025-59465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59465">CVE-2025-59465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59466/">CVE-2025-59466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59466">CVE-2025-59466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21637/">CVE-2026-21637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21637">CVE-2026-21637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055169" comment="nodejs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055170" comment="nodejs-devel-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055171" comment="nodejs-docs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055172" comment="nodejs-full-i18n-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055173" comment="nodejs-libs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055174" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+23894+c8377628 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055175" comment="nodejs-packaging-2021.06-6.module+el9.7.0+23894+c8377628 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055176" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+23894+c8377628 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055177" comment="npm-11.6.2-1.24.13.0.1.module+el9.7.0+23894+c8377628 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055178" comment="v8-13.6-devel-13.6.233.17-1.24.13.0.1.module+el9.7.0+23894+c8377628 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4922" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-55130" ref_url="https://www.suse.com/security/cve/CVE-2025-55130/" source="CVE"/>
		<reference ref_id="CVE-2025-55131" ref_url="https://www.suse.com/security/cve/CVE-2025-55131/" source="CVE"/>
		<reference ref_id="CVE-2025-55132" ref_url="https://www.suse.com/security/cve/CVE-2025-55132/" source="CVE"/>
		<reference ref_id="CVE-2025-59465" ref_url="https://www.suse.com/security/cve/CVE-2025-59465/" source="CVE"/>
		<reference ref_id="CVE-2025-59466" ref_url="https://www.suse.com/security/cve/CVE-2025-59466/" source="CVE"/>
		<reference ref_id="CVE-2026-21637" ref_url="https://www.suse.com/security/cve/CVE-2026-21637/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2782.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2782.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55130/">CVE-2025-55130 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55130">CVE-2025-55130 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55131/">CVE-2025-55131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55131">CVE-2025-55131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55132/">CVE-2025-55132 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55132">CVE-2025-55132 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59465/">CVE-2025-59465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59465">CVE-2025-59465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59466/">CVE-2025-59466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59466">CVE-2025-59466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21637/">CVE-2026-21637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21637">CVE-2026-21637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055179" comment="nodejs-22.22.0-1.module+el9.7.0+23896+b5802de9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055180" comment="nodejs-devel-22.22.0-1.module+el9.7.0+23896+b5802de9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055181" comment="nodejs-docs-22.22.0-1.module+el9.7.0+23896+b5802de9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055182" comment="nodejs-full-i18n-22.22.0-1.module+el9.7.0+23896+b5802de9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055183" comment="nodejs-libs-22.22.0-1.module+el9.7.0+23896+b5802de9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055184" comment="nodejs-nodemon-3.0.1-1.module+el9.7.0+23896+b5802de9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055185" comment="nodejs-packaging-2021.06-5.module+el9.7.0+23896+b5802de9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055186" comment="nodejs-packaging-bundler-2021.06-5.module+el9.7.0+23896+b5802de9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055187" comment="npm-10.9.4-1.22.22.0.1.module+el9.7.0+23896+b5802de9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055188" comment="v8-12.4-devel-12.4.254.21-1.22.22.0.1.module+el9.7.0+23896+b5802de9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4923" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-55130" ref_url="https://www.suse.com/security/cve/CVE-2025-55130/" source="CVE"/>
		<reference ref_id="CVE-2025-55131" ref_url="https://www.suse.com/security/cve/CVE-2025-55131/" source="CVE"/>
		<reference ref_id="CVE-2025-55132" ref_url="https://www.suse.com/security/cve/CVE-2025-55132/" source="CVE"/>
		<reference ref_id="CVE-2025-59465" ref_url="https://www.suse.com/security/cve/CVE-2025-59465/" source="CVE"/>
		<reference ref_id="CVE-2025-59466" ref_url="https://www.suse.com/security/cve/CVE-2025-59466/" source="CVE"/>
		<reference ref_id="CVE-2026-21637" ref_url="https://www.suse.com/security/cve/CVE-2026-21637/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2783.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2783.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55130/">CVE-2025-55130 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55130">CVE-2025-55130 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55131/">CVE-2025-55131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55131">CVE-2025-55131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55132/">CVE-2025-55132 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55132">CVE-2025-55132 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59465/">CVE-2025-59465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59465">CVE-2025-59465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59466/">CVE-2025-59466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59466">CVE-2025-59466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21637/">CVE-2026-21637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21637">CVE-2026-21637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055189" comment="nodejs-20.20.0-1.module+el9.7.0+23895+0637d423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055190" comment="nodejs-devel-20.20.0-1.module+el9.7.0+23895+0637d423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055191" comment="nodejs-docs-20.20.0-1.module+el9.7.0+23895+0637d423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055192" comment="nodejs-full-i18n-20.20.0-1.module+el9.7.0+23895+0637d423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055193" comment="nodejs-nodemon-3.0.1-1.module+el9.7.0+23895+0637d423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055194" comment="nodejs-packaging-2021.06-5.module+el9.7.0+23895+0637d423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055195" comment="nodejs-packaging-bundler-2021.06-5.module+el9.7.0+23895+0637d423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055196" comment="npm-10.8.2-1.20.20.0.1.module+el9.7.0+23895+0637d423 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4924" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-15281" ref_url="https://www.suse.com/security/cve/CVE-2025-15281/" source="CVE"/>
		<reference ref_id="CVE-2026-0861" ref_url="https://www.suse.com/security/cve/CVE-2026-0861/" source="CVE"/>
		<reference ref_id="CVE-2026-0915" ref_url="https://www.suse.com/security/cve/CVE-2026-0915/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2786.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2786.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15281/">CVE-2025-15281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15281">CVE-2025-15281 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0861/">CVE-2026-0861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0861">CVE-2026-0861 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0915/">CVE-2026-0915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0915">CVE-2026-0915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055197" comment="glibc-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055198" comment="glibc-all-langpacks-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055199" comment="glibc-benchtests-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055200" comment="glibc-common-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055201" comment="glibc-devel-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055202" comment="glibc-doc-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055203" comment="glibc-gconv-extra-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055204" comment="glibc-headers-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055205" comment="glibc-langpack-aa-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055206" comment="glibc-langpack-af-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055207" comment="glibc-langpack-agr-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055208" comment="glibc-langpack-ak-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055209" comment="glibc-langpack-am-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055210" comment="glibc-langpack-an-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055211" comment="glibc-langpack-anp-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055212" comment="glibc-langpack-ar-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055213" comment="glibc-langpack-as-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055214" comment="glibc-langpack-ast-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055215" comment="glibc-langpack-ayc-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055216" comment="glibc-langpack-az-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055217" comment="glibc-langpack-be-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055218" comment="glibc-langpack-bem-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055219" comment="glibc-langpack-ber-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055220" comment="glibc-langpack-bg-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055221" comment="glibc-langpack-bhb-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055222" comment="glibc-langpack-bho-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055223" comment="glibc-langpack-bi-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055224" comment="glibc-langpack-bn-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055225" comment="glibc-langpack-bo-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055226" comment="glibc-langpack-br-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055227" comment="glibc-langpack-brx-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055228" comment="glibc-langpack-bs-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055229" comment="glibc-langpack-byn-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055230" comment="glibc-langpack-ca-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055231" comment="glibc-langpack-ce-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055232" comment="glibc-langpack-chr-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055233" comment="glibc-langpack-ckb-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055234" comment="glibc-langpack-cmn-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055235" comment="glibc-langpack-crh-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055236" comment="glibc-langpack-cs-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055237" comment="glibc-langpack-csb-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055238" comment="glibc-langpack-cv-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055239" comment="glibc-langpack-cy-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055240" comment="glibc-langpack-da-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055241" comment="glibc-langpack-de-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055242" comment="glibc-langpack-doi-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055243" comment="glibc-langpack-dsb-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055244" comment="glibc-langpack-dv-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055245" comment="glibc-langpack-dz-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055246" comment="glibc-langpack-el-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055247" comment="glibc-langpack-en-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055248" comment="glibc-langpack-eo-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055249" comment="glibc-langpack-es-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055250" comment="glibc-langpack-et-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055251" comment="glibc-langpack-eu-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055252" comment="glibc-langpack-fa-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055253" comment="glibc-langpack-ff-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055254" comment="glibc-langpack-fi-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055255" comment="glibc-langpack-fil-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055256" comment="glibc-langpack-fo-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055257" comment="glibc-langpack-fr-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055258" comment="glibc-langpack-fur-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055259" comment="glibc-langpack-fy-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055260" comment="glibc-langpack-ga-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055261" comment="glibc-langpack-gd-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055262" comment="glibc-langpack-gez-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055263" comment="glibc-langpack-gl-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055264" comment="glibc-langpack-gu-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055265" comment="glibc-langpack-gv-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055266" comment="glibc-langpack-ha-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055267" comment="glibc-langpack-hak-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055268" comment="glibc-langpack-he-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055269" comment="glibc-langpack-hi-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055270" comment="glibc-langpack-hif-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055271" comment="glibc-langpack-hne-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055272" comment="glibc-langpack-hr-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055273" comment="glibc-langpack-hsb-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055274" comment="glibc-langpack-ht-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055275" comment="glibc-langpack-hu-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055276" comment="glibc-langpack-hy-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055277" comment="glibc-langpack-ia-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055278" comment="glibc-langpack-id-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055279" comment="glibc-langpack-ig-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055280" comment="glibc-langpack-ik-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055281" comment="glibc-langpack-is-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055282" comment="glibc-langpack-it-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055283" comment="glibc-langpack-iu-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055284" comment="glibc-langpack-ja-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055285" comment="glibc-langpack-ka-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055286" comment="glibc-langpack-kab-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055287" comment="glibc-langpack-kk-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055288" comment="glibc-langpack-kl-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055289" comment="glibc-langpack-km-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055290" comment="glibc-langpack-kn-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055291" comment="glibc-langpack-ko-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055292" comment="glibc-langpack-kok-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055293" comment="glibc-langpack-ks-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055294" comment="glibc-langpack-ku-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055295" comment="glibc-langpack-kw-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055296" comment="glibc-langpack-ky-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055297" comment="glibc-langpack-lb-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055298" comment="glibc-langpack-lg-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055299" comment="glibc-langpack-li-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055300" comment="glibc-langpack-lij-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055301" comment="glibc-langpack-ln-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055302" comment="glibc-langpack-lo-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055303" comment="glibc-langpack-lt-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055304" comment="glibc-langpack-lv-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055305" comment="glibc-langpack-lzh-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055306" comment="glibc-langpack-mag-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055307" comment="glibc-langpack-mai-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055308" comment="glibc-langpack-mfe-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055309" comment="glibc-langpack-mg-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055310" comment="glibc-langpack-mhr-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055311" comment="glibc-langpack-mi-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055312" comment="glibc-langpack-miq-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055313" comment="glibc-langpack-mjw-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055314" comment="glibc-langpack-mk-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055315" comment="glibc-langpack-ml-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055316" comment="glibc-langpack-mn-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055317" comment="glibc-langpack-mni-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055318" comment="glibc-langpack-mnw-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055319" comment="glibc-langpack-mr-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055320" comment="glibc-langpack-ms-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055321" comment="glibc-langpack-mt-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055322" comment="glibc-langpack-my-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055323" comment="glibc-langpack-nan-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055324" comment="glibc-langpack-nb-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055325" comment="glibc-langpack-nds-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055326" comment="glibc-langpack-ne-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055327" comment="glibc-langpack-nhn-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055328" comment="glibc-langpack-niu-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055329" comment="glibc-langpack-nl-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055330" comment="glibc-langpack-nn-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055331" comment="glibc-langpack-nr-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055332" comment="glibc-langpack-nso-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055333" comment="glibc-langpack-oc-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055334" comment="glibc-langpack-om-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055335" comment="glibc-langpack-or-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055336" comment="glibc-langpack-os-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055337" comment="glibc-langpack-pa-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055338" comment="glibc-langpack-pap-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055339" comment="glibc-langpack-pl-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055340" comment="glibc-langpack-ps-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055341" comment="glibc-langpack-pt-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055342" comment="glibc-langpack-quz-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055343" comment="glibc-langpack-raj-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055344" comment="glibc-langpack-ro-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055345" comment="glibc-langpack-ru-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055346" comment="glibc-langpack-rw-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055347" comment="glibc-langpack-sa-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055348" comment="glibc-langpack-sah-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055349" comment="glibc-langpack-sat-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055350" comment="glibc-langpack-sc-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055351" comment="glibc-langpack-sd-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055352" comment="glibc-langpack-se-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055353" comment="glibc-langpack-sgs-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055354" comment="glibc-langpack-shn-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055355" comment="glibc-langpack-shs-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055356" comment="glibc-langpack-si-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055357" comment="glibc-langpack-sid-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055358" comment="glibc-langpack-sk-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055359" comment="glibc-langpack-sl-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055360" comment="glibc-langpack-sm-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055361" comment="glibc-langpack-so-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055362" comment="glibc-langpack-sq-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055363" comment="glibc-langpack-sr-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055364" comment="glibc-langpack-ss-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055365" comment="glibc-langpack-st-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055366" comment="glibc-langpack-sv-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055367" comment="glibc-langpack-sw-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055368" comment="glibc-langpack-szl-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055369" comment="glibc-langpack-ta-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055370" comment="glibc-langpack-tcy-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055371" comment="glibc-langpack-te-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055372" comment="glibc-langpack-tg-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055373" comment="glibc-langpack-th-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055374" comment="glibc-langpack-the-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055375" comment="glibc-langpack-ti-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055376" comment="glibc-langpack-tig-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055377" comment="glibc-langpack-tk-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055378" comment="glibc-langpack-tl-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055379" comment="glibc-langpack-tn-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055380" comment="glibc-langpack-to-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055381" comment="glibc-langpack-tpi-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055382" comment="glibc-langpack-tr-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055383" comment="glibc-langpack-ts-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055384" comment="glibc-langpack-tt-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055385" comment="glibc-langpack-ug-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055386" comment="glibc-langpack-uk-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055387" comment="glibc-langpack-unm-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055388" comment="glibc-langpack-ur-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055389" comment="glibc-langpack-uz-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055390" comment="glibc-langpack-ve-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055391" comment="glibc-langpack-vi-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055392" comment="glibc-langpack-wa-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055393" comment="glibc-langpack-wae-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055394" comment="glibc-langpack-wal-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055395" comment="glibc-langpack-wo-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055396" comment="glibc-langpack-xh-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055397" comment="glibc-langpack-yi-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055398" comment="glibc-langpack-yo-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055399" comment="glibc-langpack-yue-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055400" comment="glibc-langpack-yuw-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055401" comment="glibc-langpack-zh-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055402" comment="glibc-langpack-zu-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055403" comment="glibc-locale-source-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055404" comment="glibc-minimal-langpack-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055405" comment="glibc-nss-devel-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055406" comment="glibc-static-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055407" comment="glibc-utils-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055408" comment="libnsl-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055409" comment="nscd-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055410" comment="nss_db-2.34-231.el9_7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055411" comment="nss_hesiod-2.34-231.el9_7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4925" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-14177" ref_url="https://www.suse.com/security/cve/CVE-2025-14177/" source="CVE"/>
		<reference ref_id="CVE-2025-14178" ref_url="https://www.suse.com/security/cve/CVE-2025-14178/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2799.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2799.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14177/">CVE-2025-14177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14177">CVE-2025-14177 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14178/">CVE-2025-14178 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14178">CVE-2025-14178 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055412" comment="php-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055413" comment="php-bcmath-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055414" comment="php-cli-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055415" comment="php-common-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055416" comment="php-dba-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055417" comment="php-dbg-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055418" comment="php-devel-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055419" comment="php-embedded-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055420" comment="php-enchant-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055421" comment="php-ffi-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055422" comment="php-fpm-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055423" comment="php-gd-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055424" comment="php-gmp-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055425" comment="php-intl-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055426" comment="php-ldap-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055427" comment="php-mbstring-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055428" comment="php-mysqlnd-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055429" comment="php-odbc-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055430" comment="php-opcache-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055431" comment="php-pdo-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055432" comment="php-pgsql-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055433" comment="php-process-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055434" comment="php-snmp-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055435" comment="php-soap-8.0.30-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055436" comment="php-xml-8.0.30-5.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4926" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<reference ref_id="CVE-2026-21721" ref_url="https://www.suse.com/security/cve/CVE-2026-21721/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2920.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2920.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21721/">CVE-2026-21721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21721">CVE-2026-21721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055437" comment="grafana-10.2.6-18.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055438" comment="grafana-selinux-10.2.6-18.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4927" version="1" class="patch">
	<metadata>
		<title>security update for libpng15 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-25646" ref_url="https://www.suse.com/security/cve/CVE-2026-25646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3031.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3031.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25646/">CVE-2026-25646 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25646">CVE-2026-25646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055439" comment="libpng15-1.5.30-14.el9_7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4928" version="1" class="patch">
	<metadata>
		<title>security update for munge (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-25506" ref_url="https://www.suse.com/security/cve/CVE-2026-25506/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3034.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3034.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2026-25506/">CVE-2026-25506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25506">CVE-2026-25506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055440" comment="munge-0.5.13-14.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055441" comment="munge-devel-0.5.13-14.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055442" comment="munge-libs-0.5.13-14.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4929" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3040.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3040.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055443" comment="grafana-pcp-5.1.1-12.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4930" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-38129" ref_url="https://www.suse.com/security/cve/CVE-2025-38129/" source="CVE"/>
		<reference ref_id="CVE-2025-38206" ref_url="https://www.suse.com/security/cve/CVE-2025-38206/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3066.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3066.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38129/">CVE-2025-38129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38129">CVE-2025-38129 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38206/">CVE-2025-38206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38206">CVE-2025-38206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055444" comment="kernel-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055445" comment="kernel-abi-stablelists-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055446" comment="kernel-core-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055447" comment="kernel-cross-headers-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055448" comment="kernel-debug-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055449" comment="kernel-debug-core-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055450" comment="kernel-debug-modules-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055451" comment="kernel-debug-modules-core-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055452" comment="kernel-debug-modules-extra-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055453" comment="kernel-debug-uki-virt-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055454" comment="kernel-doc-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055455" comment="kernel-headers-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055456" comment="kernel-modules-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055457" comment="kernel-modules-core-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055458" comment="kernel-modules-extra-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055459" comment="kernel-rt-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055460" comment="kernel-rt-core-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055461" comment="kernel-rt-debug-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055462" comment="kernel-rt-debug-core-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055463" comment="kernel-rt-debug-modules-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055464" comment="kernel-rt-debug-modules-core-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055465" comment="kernel-rt-debug-modules-extra-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055466" comment="kernel-rt-modules-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055467" comment="kernel-rt-modules-core-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055468" comment="kernel-rt-modules-extra-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055469" comment="kernel-tools-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055470" comment="kernel-tools-libs-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055471" comment="kernel-uki-virt-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055472" comment="kernel-uki-virt-addons-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055473" comment="libperf-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055474" comment="perf-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055475" comment="python3-perf-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055476" comment="rtla-5.14.0-611.35.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055477" comment="rv-5.14.0-611.35.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4931" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-22855" ref_url="https://www.suse.com/security/cve/CVE-2026-22855/" source="CVE"/>
		<reference ref_id="CVE-2026-22858" ref_url="https://www.suse.com/security/cve/CVE-2026-22858/" source="CVE"/>
		<reference ref_id="CVE-2026-22859" ref_url="https://www.suse.com/security/cve/CVE-2026-22859/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3067.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3067.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22855/">CVE-2026-22855 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22855">CVE-2026-22855 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22858/">CVE-2026-22858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22858">CVE-2026-22858 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22859/">CVE-2026-22859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22859">CVE-2026-22859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055478" comment="freerdp-2.11.7-1.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055479" comment="freerdp-devel-2.11.7-1.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055480" comment="freerdp-libs-2.11.7-1.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055481" comment="libwinpr-2.11.7-1.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055482" comment="libwinpr-devel-2.11.7-1.el9_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4932" version="1" class="patch">
	<metadata>
		<title>security update for protobuf (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-0994" ref_url="https://www.suse.com/security/cve/CVE-2026-0994/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3095.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3095.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0994/">CVE-2026-0994 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0994">CVE-2026-0994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055483" comment="protobuf-3.14.0-17.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055484" comment="protobuf-compiler-3.14.0-17.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055485" comment="protobuf-devel-3.14.0-17.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055486" comment="protobuf-lite-3.14.0-17.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055487" comment="protobuf-lite-devel-3.14.0-17.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055488" comment="python3-protobuf-3.14.0-17.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4933" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-14905" ref_url="https://www.suse.com/security/cve/CVE-2025-14905/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3189.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3189.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14905/">CVE-2025-14905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14905">CVE-2025-14905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055489" comment="389-ds-base-2.7.0-10.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055490" comment="389-ds-base-devel-2.7.0-10.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055491" comment="389-ds-base-libs-2.7.0-10.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055492" comment="389-ds-base-snmp-2.7.0-10.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055493" comment="python3-lib389-2.7.0-10.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4934" version="1" class="patch">
	<metadata>
		<title>security update for runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3291.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3291.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055494" comment="runc-1.4.0-2.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4935" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3298.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3298.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055495" comment="buildah-1.41.8-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055496" comment="buildah-tests-1.41.8-2.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4936" version="1" class="patch">
	<metadata>
		<title>security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3337.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3337.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055497" comment="podman-5.6.0-14.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055498" comment="podman-docker-5.6.0-14.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055499" comment="podman-plugins-5.6.0-14.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055500" comment="podman-remote-5.6.0-14.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055501" comment="podman-tests-5.6.0-14.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4937" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-2447" ref_url="https://www.suse.com/security/cve/CVE-2026-2447/" source="CVE"/>
		<reference ref_id="CVE-2026-2757" ref_url="https://www.suse.com/security/cve/CVE-2026-2757/" source="CVE"/>
		<reference ref_id="CVE-2026-2758" ref_url="https://www.suse.com/security/cve/CVE-2026-2758/" source="CVE"/>
		<reference ref_id="CVE-2026-2759" ref_url="https://www.suse.com/security/cve/CVE-2026-2759/" source="CVE"/>
		<reference ref_id="CVE-2026-2760" ref_url="https://www.suse.com/security/cve/CVE-2026-2760/" source="CVE"/>
		<reference ref_id="CVE-2026-2761" ref_url="https://www.suse.com/security/cve/CVE-2026-2761/" source="CVE"/>
		<reference ref_id="CVE-2026-2762" ref_url="https://www.suse.com/security/cve/CVE-2026-2762/" source="CVE"/>
		<reference ref_id="CVE-2026-2763" ref_url="https://www.suse.com/security/cve/CVE-2026-2763/" source="CVE"/>
		<reference ref_id="CVE-2026-2764" ref_url="https://www.suse.com/security/cve/CVE-2026-2764/" source="CVE"/>
		<reference ref_id="CVE-2026-2765" ref_url="https://www.suse.com/security/cve/CVE-2026-2765/" source="CVE"/>
		<reference ref_id="CVE-2026-2766" ref_url="https://www.suse.com/security/cve/CVE-2026-2766/" source="CVE"/>
		<reference ref_id="CVE-2026-2767" ref_url="https://www.suse.com/security/cve/CVE-2026-2767/" source="CVE"/>
		<reference ref_id="CVE-2026-2768" ref_url="https://www.suse.com/security/cve/CVE-2026-2768/" source="CVE"/>
		<reference ref_id="CVE-2026-2769" ref_url="https://www.suse.com/security/cve/CVE-2026-2769/" source="CVE"/>
		<reference ref_id="CVE-2026-2770" ref_url="https://www.suse.com/security/cve/CVE-2026-2770/" source="CVE"/>
		<reference ref_id="CVE-2026-2771" ref_url="https://www.suse.com/security/cve/CVE-2026-2771/" source="CVE"/>
		<reference ref_id="CVE-2026-2772" ref_url="https://www.suse.com/security/cve/CVE-2026-2772/" source="CVE"/>
		<reference ref_id="CVE-2026-2773" ref_url="https://www.suse.com/security/cve/CVE-2026-2773/" source="CVE"/>
		<reference ref_id="CVE-2026-2774" ref_url="https://www.suse.com/security/cve/CVE-2026-2774/" source="CVE"/>
		<reference ref_id="CVE-2026-2775" ref_url="https://www.suse.com/security/cve/CVE-2026-2775/" source="CVE"/>
		<reference ref_id="CVE-2026-2776" ref_url="https://www.suse.com/security/cve/CVE-2026-2776/" source="CVE"/>
		<reference ref_id="CVE-2026-2777" ref_url="https://www.suse.com/security/cve/CVE-2026-2777/" source="CVE"/>
		<reference ref_id="CVE-2026-2778" ref_url="https://www.suse.com/security/cve/CVE-2026-2778/" source="CVE"/>
		<reference ref_id="CVE-2026-2779" ref_url="https://www.suse.com/security/cve/CVE-2026-2779/" source="CVE"/>
		<reference ref_id="CVE-2026-2780" ref_url="https://www.suse.com/security/cve/CVE-2026-2780/" source="CVE"/>
		<reference ref_id="CVE-2026-2781" ref_url="https://www.suse.com/security/cve/CVE-2026-2781/" source="CVE"/>
		<reference ref_id="CVE-2026-2782" ref_url="https://www.suse.com/security/cve/CVE-2026-2782/" source="CVE"/>
		<reference ref_id="CVE-2026-2783" ref_url="https://www.suse.com/security/cve/CVE-2026-2783/" source="CVE"/>
		<reference ref_id="CVE-2026-2784" ref_url="https://www.suse.com/security/cve/CVE-2026-2784/" source="CVE"/>
		<reference ref_id="CVE-2026-2785" ref_url="https://www.suse.com/security/cve/CVE-2026-2785/" source="CVE"/>
		<reference ref_id="CVE-2026-2786" ref_url="https://www.suse.com/security/cve/CVE-2026-2786/" source="CVE"/>
		<reference ref_id="CVE-2026-2787" ref_url="https://www.suse.com/security/cve/CVE-2026-2787/" source="CVE"/>
		<reference ref_id="CVE-2026-2788" ref_url="https://www.suse.com/security/cve/CVE-2026-2788/" source="CVE"/>
		<reference ref_id="CVE-2026-2789" ref_url="https://www.suse.com/security/cve/CVE-2026-2789/" source="CVE"/>
		<reference ref_id="CVE-2026-2790" ref_url="https://www.suse.com/security/cve/CVE-2026-2790/" source="CVE"/>
		<reference ref_id="CVE-2026-2791" ref_url="https://www.suse.com/security/cve/CVE-2026-2791/" source="CVE"/>
		<reference ref_id="CVE-2026-2792" ref_url="https://www.suse.com/security/cve/CVE-2026-2792/" source="CVE"/>
		<reference ref_id="CVE-2026-2793" ref_url="https://www.suse.com/security/cve/CVE-2026-2793/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3339.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3339.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2447/">CVE-2026-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2447">CVE-2026-2447 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2757/">CVE-2026-2757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2757">CVE-2026-2757 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2758/">CVE-2026-2758 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2758">CVE-2026-2758 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2759/">CVE-2026-2759 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2759">CVE-2026-2759 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2760/">CVE-2026-2760 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2760">CVE-2026-2760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2761/">CVE-2026-2761 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2761">CVE-2026-2761 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2762/">CVE-2026-2762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2762">CVE-2026-2762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2763/">CVE-2026-2763 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2763">CVE-2026-2763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2764/">CVE-2026-2764 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2764">CVE-2026-2764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2765/">CVE-2026-2765 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2765">CVE-2026-2765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2766/">CVE-2026-2766 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2766">CVE-2026-2766 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2767/">CVE-2026-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2767">CVE-2026-2767 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2768/">CVE-2026-2768 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2768">CVE-2026-2768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2769/">CVE-2026-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2769">CVE-2026-2769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2770/">CVE-2026-2770 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2770">CVE-2026-2770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2771/">CVE-2026-2771 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2771">CVE-2026-2771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2772/">CVE-2026-2772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2772">CVE-2026-2772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2773/">CVE-2026-2773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2773">CVE-2026-2773 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2774/">CVE-2026-2774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2774">CVE-2026-2774 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-2775/">CVE-2026-2775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2775">CVE-2026-2775 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2776/">CVE-2026-2776 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2776">CVE-2026-2776 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2777/">CVE-2026-2777 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2777">CVE-2026-2777 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2778/">CVE-2026-2778 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2778">CVE-2026-2778 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2779/">CVE-2026-2779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2779">CVE-2026-2779 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2780/">CVE-2026-2780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2780">CVE-2026-2780 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2781/">CVE-2026-2781 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2781">CVE-2026-2781 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2782/">CVE-2026-2782 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2782">CVE-2026-2782 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2783/">CVE-2026-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2783">CVE-2026-2783 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2784/">CVE-2026-2784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2784">CVE-2026-2784 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2785/">CVE-2026-2785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2785">CVE-2026-2785 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2786/">CVE-2026-2786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2786">CVE-2026-2786 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2787/">CVE-2026-2787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2787">CVE-2026-2787 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2788/">CVE-2026-2788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2788">CVE-2026-2788 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2789/">CVE-2026-2789 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2789">CVE-2026-2789 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2790/">CVE-2026-2790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2790">CVE-2026-2790 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2791/">CVE-2026-2791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2791">CVE-2026-2791 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2792/">CVE-2026-2792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2792">CVE-2026-2792 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2793/">CVE-2026-2793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2793">CVE-2026-2793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4938" version="1" class="patch">
	<metadata>
		<title>security update for skopeo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3340.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3340.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055504" comment="skopeo-1.20.0-3.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055505" comment="skopeo-tests-1.20.0-3.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4939" version="1" class="patch">
	<metadata>
		<title>security update for containernetworking-plugins (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3341.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3341.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055506" comment="containernetworking-plugins-1.7.1-3.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4940" version="1" class="patch">
	<metadata>
		<title>security update for python-pyasn1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-23490" ref_url="https://www.suse.com/security/cve/CVE-2026-23490/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3359.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3359.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23490/">CVE-2026-23490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23490">CVE-2026-23490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055507" comment="python3-pyasn1-0.4.8-7.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055508" comment="python3-pyasn1-modules-0.4.8-7.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4941" version="1" class="patch">
	<metadata>
		<title>security update for libpng (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-22695" ref_url="https://www.suse.com/security/cve/CVE-2026-22695/" source="CVE"/>
		<reference ref_id="CVE-2026-22801" ref_url="https://www.suse.com/security/cve/CVE-2026-22801/" source="CVE"/>
		<reference ref_id="CVE-2026-25646" ref_url="https://www.suse.com/security/cve/CVE-2026-25646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3405.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3405.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22695/">CVE-2026-22695 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22695">CVE-2026-22695 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22801/">CVE-2026-22801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22801">CVE-2026-22801 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25646/">CVE-2026-25646 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25646">CVE-2026-25646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055509" comment="libpng-1.6.37-12.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055510" comment="libpng-devel-1.6.37-12.el9_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4942" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-40168" ref_url="https://www.suse.com/security/cve/CVE-2025-40168/" source="CVE"/>
		<reference ref_id="CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085/" source="CVE"/>
		<reference ref_id="CVE-2026-23097" ref_url="https://www.suse.com/security/cve/CVE-2026-23097/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3488.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3488.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40168/">CVE-2025-40168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40168">CVE-2025-40168 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23097/">CVE-2026-23097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23097">CVE-2026-23097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055511" comment="kernel-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055512" comment="kernel-abi-stablelists-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055513" comment="kernel-core-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055514" comment="kernel-cross-headers-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055515" comment="kernel-debug-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055516" comment="kernel-debug-core-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055517" comment="kernel-debug-modules-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055518" comment="kernel-debug-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055519" comment="kernel-debug-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055520" comment="kernel-debug-uki-virt-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055521" comment="kernel-doc-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055522" comment="kernel-headers-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055523" comment="kernel-modules-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055524" comment="kernel-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055525" comment="kernel-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055526" comment="kernel-rt-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055527" comment="kernel-rt-core-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055528" comment="kernel-rt-debug-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055529" comment="kernel-rt-debug-core-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055530" comment="kernel-rt-debug-modules-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055531" comment="kernel-rt-debug-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055532" comment="kernel-rt-debug-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055533" comment="kernel-rt-modules-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055534" comment="kernel-rt-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055535" comment="kernel-rt-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055536" comment="kernel-tools-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055537" comment="kernel-tools-libs-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055538" comment="kernel-uki-virt-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055539" comment="kernel-uki-virt-addons-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055540" comment="libperf-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055541" comment="perf-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055542" comment="python3-perf-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055543" comment="rtla-5.14.0-611.36.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055544" comment="rv-5.14.0-611.36.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4943" version="1" class="patch">
	<metadata>
		<title>security update for valkey (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-67733" ref_url="https://www.suse.com/security/cve/CVE-2025-67733/" source="CVE"/>
		<reference ref_id="CVE-2026-21863" ref_url="https://www.suse.com/security/cve/CVE-2026-21863/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3507.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3507.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-67733/">CVE-2025-67733 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67733">CVE-2025-67733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21863/">CVE-2026-21863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21863">CVE-2026-21863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055545" comment="valkey-8.0.7-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055546" comment="valkey-devel-8.0.7-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4944" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-2447" ref_url="https://www.suse.com/security/cve/CVE-2026-2447/" source="CVE"/>
		<reference ref_id="CVE-2026-2757" ref_url="https://www.suse.com/security/cve/CVE-2026-2757/" source="CVE"/>
		<reference ref_id="CVE-2026-2758" ref_url="https://www.suse.com/security/cve/CVE-2026-2758/" source="CVE"/>
		<reference ref_id="CVE-2026-2759" ref_url="https://www.suse.com/security/cve/CVE-2026-2759/" source="CVE"/>
		<reference ref_id="CVE-2026-2760" ref_url="https://www.suse.com/security/cve/CVE-2026-2760/" source="CVE"/>
		<reference ref_id="CVE-2026-2761" ref_url="https://www.suse.com/security/cve/CVE-2026-2761/" source="CVE"/>
		<reference ref_id="CVE-2026-2762" ref_url="https://www.suse.com/security/cve/CVE-2026-2762/" source="CVE"/>
		<reference ref_id="CVE-2026-2763" ref_url="https://www.suse.com/security/cve/CVE-2026-2763/" source="CVE"/>
		<reference ref_id="CVE-2026-2764" ref_url="https://www.suse.com/security/cve/CVE-2026-2764/" source="CVE"/>
		<reference ref_id="CVE-2026-2765" ref_url="https://www.suse.com/security/cve/CVE-2026-2765/" source="CVE"/>
		<reference ref_id="CVE-2026-2766" ref_url="https://www.suse.com/security/cve/CVE-2026-2766/" source="CVE"/>
		<reference ref_id="CVE-2026-2767" ref_url="https://www.suse.com/security/cve/CVE-2026-2767/" source="CVE"/>
		<reference ref_id="CVE-2026-2768" ref_url="https://www.suse.com/security/cve/CVE-2026-2768/" source="CVE"/>
		<reference ref_id="CVE-2026-2769" ref_url="https://www.suse.com/security/cve/CVE-2026-2769/" source="CVE"/>
		<reference ref_id="CVE-2026-2770" ref_url="https://www.suse.com/security/cve/CVE-2026-2770/" source="CVE"/>
		<reference ref_id="CVE-2026-2771" ref_url="https://www.suse.com/security/cve/CVE-2026-2771/" source="CVE"/>
		<reference ref_id="CVE-2026-2772" ref_url="https://www.suse.com/security/cve/CVE-2026-2772/" source="CVE"/>
		<reference ref_id="CVE-2026-2773" ref_url="https://www.suse.com/security/cve/CVE-2026-2773/" source="CVE"/>
		<reference ref_id="CVE-2026-2774" ref_url="https://www.suse.com/security/cve/CVE-2026-2774/" source="CVE"/>
		<reference ref_id="CVE-2026-2775" ref_url="https://www.suse.com/security/cve/CVE-2026-2775/" source="CVE"/>
		<reference ref_id="CVE-2026-2776" ref_url="https://www.suse.com/security/cve/CVE-2026-2776/" source="CVE"/>
		<reference ref_id="CVE-2026-2777" ref_url="https://www.suse.com/security/cve/CVE-2026-2777/" source="CVE"/>
		<reference ref_id="CVE-2026-2778" ref_url="https://www.suse.com/security/cve/CVE-2026-2778/" source="CVE"/>
		<reference ref_id="CVE-2026-2779" ref_url="https://www.suse.com/security/cve/CVE-2026-2779/" source="CVE"/>
		<reference ref_id="CVE-2026-2780" ref_url="https://www.suse.com/security/cve/CVE-2026-2780/" source="CVE"/>
		<reference ref_id="CVE-2026-2781" ref_url="https://www.suse.com/security/cve/CVE-2026-2781/" source="CVE"/>
		<reference ref_id="CVE-2026-2782" ref_url="https://www.suse.com/security/cve/CVE-2026-2782/" source="CVE"/>
		<reference ref_id="CVE-2026-2783" ref_url="https://www.suse.com/security/cve/CVE-2026-2783/" source="CVE"/>
		<reference ref_id="CVE-2026-2784" ref_url="https://www.suse.com/security/cve/CVE-2026-2784/" source="CVE"/>
		<reference ref_id="CVE-2026-2785" ref_url="https://www.suse.com/security/cve/CVE-2026-2785/" source="CVE"/>
		<reference ref_id="CVE-2026-2786" ref_url="https://www.suse.com/security/cve/CVE-2026-2786/" source="CVE"/>
		<reference ref_id="CVE-2026-2787" ref_url="https://www.suse.com/security/cve/CVE-2026-2787/" source="CVE"/>
		<reference ref_id="CVE-2026-2788" ref_url="https://www.suse.com/security/cve/CVE-2026-2788/" source="CVE"/>
		<reference ref_id="CVE-2026-2789" ref_url="https://www.suse.com/security/cve/CVE-2026-2789/" source="CVE"/>
		<reference ref_id="CVE-2026-2790" ref_url="https://www.suse.com/security/cve/CVE-2026-2790/" source="CVE"/>
		<reference ref_id="CVE-2026-2791" ref_url="https://www.suse.com/security/cve/CVE-2026-2791/" source="CVE"/>
		<reference ref_id="CVE-2026-2792" ref_url="https://www.suse.com/security/cve/CVE-2026-2792/" source="CVE"/>
		<reference ref_id="CVE-2026-2793" ref_url="https://www.suse.com/security/cve/CVE-2026-2793/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3516.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3516.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2447/">CVE-2026-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2447">CVE-2026-2447 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2757/">CVE-2026-2757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2757">CVE-2026-2757 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2758/">CVE-2026-2758 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2758">CVE-2026-2758 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2759/">CVE-2026-2759 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2759">CVE-2026-2759 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2760/">CVE-2026-2760 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2760">CVE-2026-2760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2761/">CVE-2026-2761 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2761">CVE-2026-2761 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2762/">CVE-2026-2762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2762">CVE-2026-2762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2763/">CVE-2026-2763 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2763">CVE-2026-2763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2764/">CVE-2026-2764 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2764">CVE-2026-2764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2765/">CVE-2026-2765 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2765">CVE-2026-2765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2766/">CVE-2026-2766 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2766">CVE-2026-2766 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2767/">CVE-2026-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2767">CVE-2026-2767 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2768/">CVE-2026-2768 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2768">CVE-2026-2768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2769/">CVE-2026-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2769">CVE-2026-2769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2770/">CVE-2026-2770 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2770">CVE-2026-2770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2771/">CVE-2026-2771 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2771">CVE-2026-2771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2772/">CVE-2026-2772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2772">CVE-2026-2772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2773/">CVE-2026-2773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2773">CVE-2026-2773 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2774/">CVE-2026-2774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2774">CVE-2026-2774 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-2775/">CVE-2026-2775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2775">CVE-2026-2775 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2776/">CVE-2026-2776 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2776">CVE-2026-2776 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2777/">CVE-2026-2777 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2777">CVE-2026-2777 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2778/">CVE-2026-2778 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2778">CVE-2026-2778 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2779/">CVE-2026-2779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2779">CVE-2026-2779 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2780/">CVE-2026-2780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2780">CVE-2026-2780 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2781/">CVE-2026-2781 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2781">CVE-2026-2781 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2782/">CVE-2026-2782 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2782">CVE-2026-2782 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2783/">CVE-2026-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2783">CVE-2026-2783 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2784/">CVE-2026-2784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2784">CVE-2026-2784 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2785/">CVE-2026-2785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2785">CVE-2026-2785 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2786/">CVE-2026-2786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2786">CVE-2026-2786 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2787/">CVE-2026-2787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2787">CVE-2026-2787 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2788/">CVE-2026-2788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2788">CVE-2026-2788 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2789/">CVE-2026-2789 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2789">CVE-2026-2789 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2790/">CVE-2026-2790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2790">CVE-2026-2790 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2791/">CVE-2026-2791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2791">CVE-2026-2791 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2792/">CVE-2026-2792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2792">CVE-2026-2792 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2793/">CVE-2026-2793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2793">CVE-2026-2793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4945" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-1642" ref_url="https://www.suse.com/security/cve/CVE-2026-1642/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3638.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3638.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1642/">CVE-2026-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1642">CVE-2026-1642 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055548" comment="nginx-1.24.0-5.module+el9.7.0+24009+e763bdd7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055549" comment="nginx-all-modules-1.24.0-5.module+el9.7.0+24009+e763bdd7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055550" comment="nginx-core-1.24.0-5.module+el9.7.0+24009+e763bdd7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055551" comment="nginx-filesystem-1.24.0-5.module+el9.7.0+24009+e763bdd7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055552" comment="nginx-mod-devel-1.24.0-5.module+el9.7.0+24009+e763bdd7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055553" comment="nginx-mod-http-image-filter-1.24.0-5.module+el9.7.0+24009+e763bdd7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055554" comment="nginx-mod-http-perl-1.24.0-5.module+el9.7.0+24009+e763bdd7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055555" comment="nginx-mod-http-xslt-filter-1.24.0-5.module+el9.7.0+24009+e763bdd7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055556" comment="nginx-mod-mail-1.24.0-5.module+el9.7.0+24009+e763bdd7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055557" comment="nginx-mod-stream-1.24.0-5.module+el9.7.0+24009+e763bdd7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4946" version="1" class="patch">
	<metadata>
		<title>security update for go-rpm-macros (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3668.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3668.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055558" comment="go-filesystem-3.6.0-13.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055559" comment="go-rpm-macros-3.6.0-13.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055560" comment="go-rpm-templates-3.6.0-13.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055561" comment="go-srpm-macros-3.6.0-13.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4947" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3730.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3730.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055562" comment="postgresql-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055563" comment="postgresql-contrib-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055564" comment="postgresql-docs-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055565" comment="postgresql-plperl-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055566" comment="postgresql-plpython3-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055567" comment="postgresql-pltcl-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055568" comment="postgresql-private-devel-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055569" comment="postgresql-private-libs-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055570" comment="postgresql-server-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055571" comment="postgresql-server-devel-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055572" comment="postgresql-static-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055573" comment="postgresql-test-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055574" comment="postgresql-test-rpm-macros-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055575" comment="postgresql-upgrade-13.23-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055576" comment="postgresql-upgrade-devel-13.23-2.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4948" version="1" class="patch">
	<metadata>
		<title>security update for image-builder (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3839.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3839.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055577" comment="image-builder-31-3.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4949" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3842.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3842.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055578" comment="delve-1.25.2-2.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4950" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3896.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3896.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053988" comment="pg_repack-1.4.8-2.module+el9.5.0+22224+f5585c78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055579" comment="postgresql-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055580" comment="postgresql-contrib-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055581" comment="postgresql-docs-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055582" comment="postgresql-plperl-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055583" comment="postgresql-plpython3-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055584" comment="postgresql-pltcl-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055585" comment="postgresql-private-devel-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055586" comment="postgresql-private-libs-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055587" comment="postgresql-server-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055588" comment="postgresql-server-devel-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055589" comment="postgresql-static-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055590" comment="postgresql-test-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055591" comment="postgresql-test-rpm-macros-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055592" comment="postgresql-upgrade-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055593" comment="postgresql-upgrade-devel-15.17-1.module+el9.7.0+24029+ef6a2953 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4951" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3928.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3928.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055594" comment="git-lfs-3.6.1-7.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4952" version="1" class="patch">
	<metadata>
		<title>security update for nfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-12801" ref_url="https://www.suse.com/security/cve/CVE-2025-12801/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3940.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3940.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12801/">CVE-2025-12801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12801">CVE-2025-12801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055595" comment="libnfsidmap-2.5.4-38.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055596" comment="libnfsidmap-devel-2.5.4-38.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055597" comment="nfs-utils-2.5.4-38.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055598" comment="nfs-utils-coreos-2.5.4-38.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055599" comment="nfsv4-client-utils-2.5.4-38.el9_7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4953" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-38106" ref_url="https://www.suse.com/security/cve/CVE-2025-38106/" source="CVE"/>
		<reference ref_id="CVE-2025-68800" ref_url="https://www.suse.com/security/cve/CVE-2025-68800/" source="CVE"/>
		<reference ref_id="CVE-2026-23001" ref_url="https://www.suse.com/security/cve/CVE-2026-23001/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3966.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3966.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38106/">CVE-2025-38106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38106">CVE-2025-38106 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68800/">CVE-2025-68800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68800">CVE-2025-68800 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23001/">CVE-2026-23001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23001">CVE-2026-23001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055600" comment="kernel-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055601" comment="kernel-abi-stablelists-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055602" comment="kernel-core-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055603" comment="kernel-cross-headers-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055604" comment="kernel-debug-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055605" comment="kernel-debug-core-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055606" comment="kernel-debug-modules-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055607" comment="kernel-debug-modules-core-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055608" comment="kernel-debug-modules-extra-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055609" comment="kernel-debug-uki-virt-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055610" comment="kernel-doc-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055611" comment="kernel-headers-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055612" comment="kernel-modules-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055613" comment="kernel-modules-core-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055614" comment="kernel-modules-extra-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055615" comment="kernel-rt-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055616" comment="kernel-rt-core-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055617" comment="kernel-rt-debug-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055618" comment="kernel-rt-debug-core-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055619" comment="kernel-rt-debug-modules-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055620" comment="kernel-rt-debug-modules-core-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055621" comment="kernel-rt-debug-modules-extra-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055622" comment="kernel-rt-modules-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055623" comment="kernel-rt-modules-core-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055624" comment="kernel-rt-modules-extra-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055625" comment="kernel-tools-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055626" comment="kernel-tools-libs-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055627" comment="kernel-uki-virt-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055628" comment="kernel-uki-virt-addons-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055629" comment="libperf-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055630" comment="perf-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055631" comment="python3-perf-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055632" comment="rtla-5.14.0-611.38.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055633" comment="rv-5.14.0-611.38.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4954" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4110.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4110.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016335" comment="pg_repack-1.5.1-1.module+el9.6.0+22880+6b241eec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016336" comment="pgvector-0.6.2-2.module+el9.6.0+22979+c3d78d52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054671" comment="postgis-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054672" comment="postgis-client-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054673" comment="postgis-docs-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054674" comment="postgis-upgrade-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010054675" comment="postgis-utils-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055634" comment="postgresql-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055635" comment="postgresql-contrib-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055636" comment="postgresql-docs-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055637" comment="postgresql-plperl-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055638" comment="postgresql-plpython3-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055639" comment="postgresql-pltcl-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055640" comment="postgresql-private-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055641" comment="postgresql-private-libs-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055642" comment="postgresql-server-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055643" comment="postgresql-server-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055644" comment="postgresql-static-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055645" comment="postgresql-test-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055646" comment="postgresql-test-rpm-macros-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055647" comment="postgresql-upgrade-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055648" comment="postgresql-upgrade-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4955" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4165.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4165.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055649" comment="python3.12-3.12.12-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055650" comment="python3.12-debug-3.12.12-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055651" comment="python3.12-devel-3.12.12-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055652" comment="python3.12-idle-3.12.12-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055653" comment="python3.12-libs-3.12.12-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055654" comment="python3.12-test-3.12.12-4.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055655" comment="python3.12-tkinter-3.12.12-4.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4956" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<reference ref_id="CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865/" source="CVE"/>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4168.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4168.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055656" comment="python-unversioned-command-3.9.25-3.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055657" comment="python3-3.9.25-3.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055658" comment="python3-debug-3.9.25-3.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055659" comment="python3-devel-3.9.25-3.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055660" comment="python3-idle-3.9.25-3.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055661" comment="python3-libs-3.9.25-3.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055662" comment="python3-test-3.9.25-3.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055663" comment="python3-tkinter-3.9.25-3.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4957" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-0797" ref_url="https://www.suse.com/security/cve/CVE-2026-0797/" source="CVE"/>
		<reference ref_id="CVE-2026-2044" ref_url="https://www.suse.com/security/cve/CVE-2026-2044/" source="CVE"/>
		<reference ref_id="CVE-2026-2045" ref_url="https://www.suse.com/security/cve/CVE-2026-2045/" source="CVE"/>
		<reference ref_id="CVE-2026-2047" ref_url="https://www.suse.com/security/cve/CVE-2026-2047/" source="CVE"/>
		<reference ref_id="CVE-2026-2048" ref_url="https://www.suse.com/security/cve/CVE-2026-2048/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4173.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4173.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0797/">CVE-2026-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0797">CVE-2026-0797 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2044/">CVE-2026-2044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2044">CVE-2026-2044 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2045/">CVE-2026-2045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2045">CVE-2026-2045 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2047/">CVE-2026-2047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2047">CVE-2026-2047 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2048/">CVE-2026-2048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2048">CVE-2026-2048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055664" comment="gimp-3.0.4-1.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055665" comment="gimp-libs-3.0.4-1.el9_7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4958" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-14831" ref_url="https://www.suse.com/security/cve/CVE-2025-14831/" source="CVE"/>
		<reference ref_id="CVE-2025-9820" ref_url="https://www.suse.com/security/cve/CVE-2025-9820/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4188.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4188.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14831/">CVE-2025-14831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14831">CVE-2025-14831 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9820/">CVE-2025-9820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9820">CVE-2025-9820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055666" comment="gnutls-3.8.3-10.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055667" comment="gnutls-c++-3.8.3-10.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055668" comment="gnutls-dane-3.8.3-10.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055669" comment="gnutls-devel-3.8.3-10.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055670" comment="gnutls-utils-3.8.3-10.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4959" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4216.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4216.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055671" comment="python3.11-3.11.13-5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055672" comment="python3.11-debug-3.11.13-5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055673" comment="python3.11-devel-3.11.13-5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055674" comment="python3.11-idle-3.11.13-5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055675" comment="python3.11-libs-3.11.13-5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055676" comment="python3.11-test-3.11.13-5.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055677" comment="python3.11-tkinter-3.11.13-5.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4960" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-1642" ref_url="https://www.suse.com/security/cve/CVE-2026-1642/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4235.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4235.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1642/">CVE-2026-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1642">CVE-2026-1642 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055678" comment="nginx-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055679" comment="nginx-all-modules-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055680" comment="nginx-core-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055681" comment="nginx-filesystem-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055682" comment="nginx-mod-devel-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055683" comment="nginx-mod-http-image-filter-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055684" comment="nginx-mod-http-perl-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055685" comment="nginx-mod-http-xslt-filter-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055686" comment="nginx-mod-mail-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055687" comment="nginx-mod-stream-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4961" version="1" class="patch">
	<metadata>
		<title>security update for dotnet10.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-26127" ref_url="https://www.suse.com/security/cve/CVE-2026-26127/" source="CVE"/>
		<reference ref_id="CVE-2026-26130" ref_url="https://www.suse.com/security/cve/CVE-2026-26130/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4445.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4445.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26127/">CVE-2026-26127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26127">CVE-2026-26127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26130/">CVE-2026-26130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26130">CVE-2026-26130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055688" comment="aspnetcore-runtime-10.0-10.0.4-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055689" comment="aspnetcore-runtime-dbg-10.0-10.0.4-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055690" comment="aspnetcore-targeting-pack-10.0-10.0.4-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055691" comment="dotnet-apphost-pack-10.0-10.0.4-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055692" comment="dotnet-host-10.0.4-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055693" comment="dotnet-hostfxr-10.0-10.0.4-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055694" comment="dotnet-runtime-10.0-10.0.4-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055695" comment="dotnet-runtime-dbg-10.0-10.0.4-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055696" comment="dotnet-sdk-10.0-10.0.104-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055697" comment="dotnet-sdk-10.0-source-built-artifacts-10.0.104-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055698" comment="dotnet-sdk-aot-10.0-10.0.104-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055699" comment="dotnet-sdk-dbg-10.0-10.0.104-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055700" comment="dotnet-targeting-pack-10.0-10.0.4-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055701" comment="dotnet-templates-10.0-10.0.104-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4962" version="1" class="patch">
	<metadata>
		<title>security update for libvpx (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-2447" ref_url="https://www.suse.com/security/cve/CVE-2026-2447/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4447.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4447.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2447/">CVE-2026-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2447">CVE-2026-2447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055702" comment="libvpx-1.9.0-10.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055703" comment="libvpx-devel-1.9.0-10.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4963" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-26130" ref_url="https://www.suse.com/security/cve/CVE-2026-26130/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4454.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4454.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26130/">CVE-2026-26130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26130">CVE-2026-26130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055704" comment="aspnetcore-runtime-8.0-8.0.25-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055705" comment="aspnetcore-runtime-dbg-8.0-8.0.25-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055706" comment="aspnetcore-targeting-pack-8.0-8.0.25-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055707" comment="dotnet-apphost-pack-8.0-8.0.25-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055708" comment="dotnet-hostfxr-8.0-8.0.25-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055709" comment="dotnet-runtime-8.0-8.0.25-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055710" comment="dotnet-runtime-dbg-8.0-8.0.25-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055711" comment="dotnet-sdk-8.0-8.0.125-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055712" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.125-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055713" comment="dotnet-sdk-dbg-8.0-8.0.125-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055714" comment="dotnet-targeting-pack-8.0-8.0.25-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055715" comment="dotnet-templates-8.0-8.0.125-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4964" version="1" class="patch">
	<metadata>
		<title>security update for dotnet9.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-26127" ref_url="https://www.suse.com/security/cve/CVE-2026-26127/" source="CVE"/>
		<reference ref_id="CVE-2026-26130" ref_url="https://www.suse.com/security/cve/CVE-2026-26130/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4456.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4456.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26127/">CVE-2026-26127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26127">CVE-2026-26127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26130/">CVE-2026-26130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26130">CVE-2026-26130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055716" comment="aspnetcore-runtime-9.0-9.0.14-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055717" comment="aspnetcore-runtime-dbg-9.0-9.0.14-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055718" comment="aspnetcore-targeting-pack-9.0-9.0.14-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055719" comment="dotnet-apphost-pack-9.0-9.0.14-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055720" comment="dotnet-hostfxr-9.0-9.0.14-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055721" comment="dotnet-runtime-9.0-9.0.14-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055722" comment="dotnet-runtime-dbg-9.0-9.0.14-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055723" comment="dotnet-sdk-9.0-9.0.115-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055724" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.115-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055725" comment="dotnet-sdk-aot-9.0-9.0.115-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055726" comment="dotnet-sdk-dbg-9.0-9.0.115-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055727" comment="dotnet-targeting-pack-9.0-9.0.14-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055728" comment="dotnet-templates-9.0-9.0.115-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055729" comment="netstandard-targeting-pack-2.1-9.0.115-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4965" version="1" class="patch">
	<metadata>
		<title>security update for compat-openssl11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-69419" ref_url="https://www.suse.com/security/cve/CVE-2025-69419/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4472.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4472.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69419/">CVE-2025-69419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69419">CVE-2025-69419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055730" comment="compat-openssl11-1.1.1k-5.el9_7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4966" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-39818" ref_url="https://www.suse.com/security/cve/CVE-2025-39818/" source="CVE"/>
		<reference ref_id="CVE-2025-68800" ref_url="https://www.suse.com/security/cve/CVE-2025-68800/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4759.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4759.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39818/">CVE-2025-39818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39818">CVE-2025-39818 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68800/">CVE-2025-68800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68800">CVE-2025-68800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055731" comment="kernel-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055732" comment="kernel-abi-stablelists-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055733" comment="kernel-core-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055734" comment="kernel-cross-headers-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055735" comment="kernel-debug-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055736" comment="kernel-debug-core-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055737" comment="kernel-debug-modules-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055738" comment="kernel-debug-modules-core-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055739" comment="kernel-debug-modules-extra-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055740" comment="kernel-debug-uki-virt-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055741" comment="kernel-doc-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055742" comment="kernel-headers-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055743" comment="kernel-modules-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055744" comment="kernel-modules-core-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055745" comment="kernel-modules-extra-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055746" comment="kernel-rt-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055747" comment="kernel-rt-core-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055748" comment="kernel-rt-debug-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055749" comment="kernel-rt-debug-core-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055750" comment="kernel-rt-debug-modules-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055751" comment="kernel-rt-debug-modules-core-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055752" comment="kernel-rt-debug-modules-extra-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055753" comment="kernel-rt-modules-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055754" comment="kernel-rt-modules-core-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055755" comment="kernel-rt-modules-extra-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055756" comment="kernel-tools-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055757" comment="kernel-tools-libs-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055758" comment="kernel-uki-virt-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055759" comment="kernel-uki-virt-addons-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055760" comment="libperf-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055761" comment="perf-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055762" comment="python3-perf-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055763" comment="rtla-5.14.0-611.41.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055764" comment="rv-5.14.0-611.41.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4967" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61662" ref_url="https://www.suse.com/security/cve/CVE-2025-61662/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4760.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4760.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61662/">CVE-2025-61662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61662">CVE-2025-61662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055765" comment="grub2-common-2.06-114.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055766" comment="grub2-efi-x64-2.06-114.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055767" comment="grub2-efi-x64-cdboot-2.06-114.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055768" comment="grub2-efi-x64-modules-2.06-114.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055769" comment="grub2-pc-2.06-114.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055770" comment="grub2-pc-modules-2.06-114.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055771" comment="grub2-tools-2.06-114.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055772" comment="grub2-tools-efi-2.06-114.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055773" comment="grub2-tools-extra-2.06-114.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055774" comment="grub2-tools-minimal-2.06-114.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4968" version="1" class="patch">
	<metadata>
		<title>security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-21936" ref_url="https://www.suse.com/security/cve/CVE-2026-21936/" source="CVE"/>
		<reference ref_id="CVE-2026-21937" ref_url="https://www.suse.com/security/cve/CVE-2026-21937/" source="CVE"/>
		<reference ref_id="CVE-2026-21941" ref_url="https://www.suse.com/security/cve/CVE-2026-21941/" source="CVE"/>
		<reference ref_id="CVE-2026-21948" ref_url="https://www.suse.com/security/cve/CVE-2026-21948/" source="CVE"/>
		<reference ref_id="CVE-2026-21964" ref_url="https://www.suse.com/security/cve/CVE-2026-21964/" source="CVE"/>
		<reference ref_id="CVE-2026-21968" ref_url="https://www.suse.com/security/cve/CVE-2026-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4828.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4828.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21936/">CVE-2026-21936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21936">CVE-2026-21936 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21937/">CVE-2026-21937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21937">CVE-2026-21937 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21941/">CVE-2026-21941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21941">CVE-2026-21941 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21948/">CVE-2026-21948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21948">CVE-2026-21948 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21964/">CVE-2026-21964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21964">CVE-2026-21964 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21968/">CVE-2026-21968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21968">CVE-2026-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055775" comment="mysql-8.0.45-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055776" comment="mysql-common-8.0.45-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055777" comment="mysql-devel-8.0.45-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055778" comment="mysql-errmsg-8.0.45-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055779" comment="mysql-libs-8.0.45-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055780" comment="mysql-server-8.0.45-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055781" comment="mysql-test-8.0.45-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4969" version="1" class="patch">
	<metadata>
		<title>security update for capstone (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-67873" ref_url="https://www.suse.com/security/cve/CVE-2025-67873/" source="CVE"/>
		<reference ref_id="CVE-2025-68114" ref_url="https://www.suse.com/security/cve/CVE-2025-68114/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4898.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4898.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67873/">CVE-2025-67873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67873">CVE-2025-67873 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68114/">CVE-2025-68114 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68114">CVE-2025-68114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055782" comment="capstone-4.0.2-11.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055783" comment="capstone-devel-4.0.2-11.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055784" comment="capstone-java-4.0.2-11.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055785" comment="python3-capstone-4.0.2-11.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4970" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-4111" ref_url="https://www.suse.com/security/cve/CVE-2026-4111/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5080.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5080.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4111/">CVE-2026-4111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4111">CVE-2026-4111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055786" comment="bsdtar-3.5.3-7.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055787" comment="libarchive-3.5.3-7.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055788" comment="libarchive-devel-3.5.3-7.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4971" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-1642" ref_url="https://www.suse.com/security/cve/CVE-2026-1642/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5599.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5599.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1642/">CVE-2026-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1642">CVE-2026-1642 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055789" comment="nginx-1.20.1-24.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055790" comment="nginx-all-modules-1.20.1-24.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055791" comment="nginx-core-1.20.1-24.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055792" comment="nginx-filesystem-1.20.1-24.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055793" comment="nginx-mod-devel-1.20.1-24.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055794" comment="nginx-mod-http-image-filter-1.20.1-24.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055795" comment="nginx-mod-http-perl-1.20.1-24.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055796" comment="nginx-mod-http-xslt-filter-1.20.1-24.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055797" comment="nginx-mod-mail-1.20.1-24.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055798" comment="nginx-mod-stream-1.20.1-24.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4972" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-25749" ref_url="https://www.suse.com/security/cve/CVE-2026-25749/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5602.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5602.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" cvss4="5.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25749/">CVE-2026-25749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25749">CVE-2026-25749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055799" comment="vim-X11-8.2.2637-23.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055800" comment="vim-common-8.2.2637-23.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055801" comment="vim-enhanced-8.2.2637-23.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055802" comment="vim-filesystem-8.2.2637-23.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055803" comment="vim-minimal-8.2.2637-23.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4973" version="1" class="patch">
	<metadata>
		<title>security update for opencryptoki (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-23893" ref_url="https://www.suse.com/security/cve/CVE-2026-23893/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5603.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5603.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2026-23893/">CVE-2026-23893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23893">CVE-2026-23893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055804" comment="opencryptoki-3.25.0-4.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055805" comment="opencryptoki-ccatok-3.25.0-4.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055806" comment="opencryptoki-devel-3.25.0-4.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055807" comment="opencryptoki-icsftok-3.25.0-4.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055808" comment="opencryptoki-libs-3.25.0-4.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055809" comment="opencryptoki-swtok-3.25.0-4.el9_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4974" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-21936" ref_url="https://www.suse.com/security/cve/CVE-2026-21936/" source="CVE"/>
		<reference ref_id="CVE-2026-21937" ref_url="https://www.suse.com/security/cve/CVE-2026-21937/" source="CVE"/>
		<reference ref_id="CVE-2026-21941" ref_url="https://www.suse.com/security/cve/CVE-2026-21941/" source="CVE"/>
		<reference ref_id="CVE-2026-21948" ref_url="https://www.suse.com/security/cve/CVE-2026-21948/" source="CVE"/>
		<reference ref_id="CVE-2026-21964" ref_url="https://www.suse.com/security/cve/CVE-2026-21964/" source="CVE"/>
		<reference ref_id="CVE-2026-21968" ref_url="https://www.suse.com/security/cve/CVE-2026-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5640.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5640.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21936/">CVE-2026-21936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21936">CVE-2026-21936 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21937/">CVE-2026-21937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21937">CVE-2026-21937 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21941/">CVE-2026-21941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21941">CVE-2026-21941 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21948/">CVE-2026-21948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21948">CVE-2026-21948 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21964/">CVE-2026-21964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21964">CVE-2026-21964 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21968/">CVE-2026-21968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21968">CVE-2026-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055810" comment="mecab-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055811" comment="mecab-devel-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055812" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055813" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055814" comment="mysql-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055815" comment="mysql-common-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055816" comment="mysql-devel-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055817" comment="mysql-errmsg-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055818" comment="mysql-libs-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055819" comment="mysql-server-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055820" comment="mysql-test-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055821" comment="mysql-test-data-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055822" comment="rapidjson-devel-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055823" comment="rapidjson-doc-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4975" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-4684" ref_url="https://www.suse.com/security/cve/CVE-2026-4684/" source="CVE"/>
		<reference ref_id="CVE-2026-4685" ref_url="https://www.suse.com/security/cve/CVE-2026-4685/" source="CVE"/>
		<reference ref_id="CVE-2026-4686" ref_url="https://www.suse.com/security/cve/CVE-2026-4686/" source="CVE"/>
		<reference ref_id="CVE-2026-4687" ref_url="https://www.suse.com/security/cve/CVE-2026-4687/" source="CVE"/>
		<reference ref_id="CVE-2026-4688" ref_url="https://www.suse.com/security/cve/CVE-2026-4688/" source="CVE"/>
		<reference ref_id="CVE-2026-4689" ref_url="https://www.suse.com/security/cve/CVE-2026-4689/" source="CVE"/>
		<reference ref_id="CVE-2026-4690" ref_url="https://www.suse.com/security/cve/CVE-2026-4690/" source="CVE"/>
		<reference ref_id="CVE-2026-4691" ref_url="https://www.suse.com/security/cve/CVE-2026-4691/" source="CVE"/>
		<reference ref_id="CVE-2026-4692" ref_url="https://www.suse.com/security/cve/CVE-2026-4692/" source="CVE"/>
		<reference ref_id="CVE-2026-4693" ref_url="https://www.suse.com/security/cve/CVE-2026-4693/" source="CVE"/>
		<reference ref_id="CVE-2026-4694" ref_url="https://www.suse.com/security/cve/CVE-2026-4694/" source="CVE"/>
		<reference ref_id="CVE-2026-4695" ref_url="https://www.suse.com/security/cve/CVE-2026-4695/" source="CVE"/>
		<reference ref_id="CVE-2026-4696" ref_url="https://www.suse.com/security/cve/CVE-2026-4696/" source="CVE"/>
		<reference ref_id="CVE-2026-4697" ref_url="https://www.suse.com/security/cve/CVE-2026-4697/" source="CVE"/>
		<reference ref_id="CVE-2026-4698" ref_url="https://www.suse.com/security/cve/CVE-2026-4698/" source="CVE"/>
		<reference ref_id="CVE-2026-4699" ref_url="https://www.suse.com/security/cve/CVE-2026-4699/" source="CVE"/>
		<reference ref_id="CVE-2026-4700" ref_url="https://www.suse.com/security/cve/CVE-2026-4700/" source="CVE"/>
		<reference ref_id="CVE-2026-4701" ref_url="https://www.suse.com/security/cve/CVE-2026-4701/" source="CVE"/>
		<reference ref_id="CVE-2026-4702" ref_url="https://www.suse.com/security/cve/CVE-2026-4702/" source="CVE"/>
		<reference ref_id="CVE-2026-4704" ref_url="https://www.suse.com/security/cve/CVE-2026-4704/" source="CVE"/>
		<reference ref_id="CVE-2026-4705" ref_url="https://www.suse.com/security/cve/CVE-2026-4705/" source="CVE"/>
		<reference ref_id="CVE-2026-4706" ref_url="https://www.suse.com/security/cve/CVE-2026-4706/" source="CVE"/>
		<reference ref_id="CVE-2026-4707" ref_url="https://www.suse.com/security/cve/CVE-2026-4707/" source="CVE"/>
		<reference ref_id="CVE-2026-4708" ref_url="https://www.suse.com/security/cve/CVE-2026-4708/" source="CVE"/>
		<reference ref_id="CVE-2026-4709" ref_url="https://www.suse.com/security/cve/CVE-2026-4709/" source="CVE"/>
		<reference ref_id="CVE-2026-4710" ref_url="https://www.suse.com/security/cve/CVE-2026-4710/" source="CVE"/>
		<reference ref_id="CVE-2026-4711" ref_url="https://www.suse.com/security/cve/CVE-2026-4711/" source="CVE"/>
		<reference ref_id="CVE-2026-4712" ref_url="https://www.suse.com/security/cve/CVE-2026-4712/" source="CVE"/>
		<reference ref_id="CVE-2026-4713" ref_url="https://www.suse.com/security/cve/CVE-2026-4713/" source="CVE"/>
		<reference ref_id="CVE-2026-4714" ref_url="https://www.suse.com/security/cve/CVE-2026-4714/" source="CVE"/>
		<reference ref_id="CVE-2026-4715" ref_url="https://www.suse.com/security/cve/CVE-2026-4715/" source="CVE"/>
		<reference ref_id="CVE-2026-4716" ref_url="https://www.suse.com/security/cve/CVE-2026-4716/" source="CVE"/>
		<reference ref_id="CVE-2026-4717" ref_url="https://www.suse.com/security/cve/CVE-2026-4717/" source="CVE"/>
		<reference ref_id="CVE-2026-4718" ref_url="https://www.suse.com/security/cve/CVE-2026-4718/" source="CVE"/>
		<reference ref_id="CVE-2026-4719" ref_url="https://www.suse.com/security/cve/CVE-2026-4719/" source="CVE"/>
		<reference ref_id="CVE-2026-4720" ref_url="https://www.suse.com/security/cve/CVE-2026-4720/" source="CVE"/>
		<reference ref_id="CVE-2026-4721" ref_url="https://www.suse.com/security/cve/CVE-2026-4721/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5930.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5930.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4684/">CVE-2026-4684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4684">CVE-2026-4684 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4685/">CVE-2026-4685 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4685">CVE-2026-4685 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4686/">CVE-2026-4686 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4686">CVE-2026-4686 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4687/">CVE-2026-4687 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4687">CVE-2026-4687 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4688/">CVE-2026-4688 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4688">CVE-2026-4688 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4689/">CVE-2026-4689 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4689">CVE-2026-4689 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4690/">CVE-2026-4690 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4690">CVE-2026-4690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4691/">CVE-2026-4691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4691">CVE-2026-4691 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4692/">CVE-2026-4692 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4692">CVE-2026-4692 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4693/">CVE-2026-4693 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4693">CVE-2026-4693 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4694/">CVE-2026-4694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4694">CVE-2026-4694 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4695/">CVE-2026-4695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4695">CVE-2026-4695 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4696/">CVE-2026-4696 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4696">CVE-2026-4696 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4697/">CVE-2026-4697 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4697">CVE-2026-4697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4698/">CVE-2026-4698 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4698">CVE-2026-4698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4699/">CVE-2026-4699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4699">CVE-2026-4699 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4700/">CVE-2026-4700 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4700">CVE-2026-4700 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4701/">CVE-2026-4701 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4701">CVE-2026-4701 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4702/">CVE-2026-4702 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4702">CVE-2026-4702 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-4704/">CVE-2026-4704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4704">CVE-2026-4704 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4705/">CVE-2026-4705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4705">CVE-2026-4705 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4706/">CVE-2026-4706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4706">CVE-2026-4706 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4707/">CVE-2026-4707 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4707">CVE-2026-4707 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4708/">CVE-2026-4708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4708">CVE-2026-4708 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4709/">CVE-2026-4709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4709">CVE-2026-4709 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4710/">CVE-2026-4710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4710">CVE-2026-4710 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4711/">CVE-2026-4711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4711">CVE-2026-4711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4712/">CVE-2026-4712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4712">CVE-2026-4712 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4713/">CVE-2026-4713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4713">CVE-2026-4713 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4714/">CVE-2026-4714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4714">CVE-2026-4714 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4715/">CVE-2026-4715 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4715">CVE-2026-4715 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4716/">CVE-2026-4716 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4716">CVE-2026-4716 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4717/">CVE-2026-4717 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4717">CVE-2026-4717 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4718/">CVE-2026-4718 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4718">CVE-2026-4718 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4719/">CVE-2026-4719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4719">CVE-2026-4719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4720/">CVE-2026-4720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4720">CVE-2026-4720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4721/">CVE-2026-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4721">CVE-2026-4721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4976" version="1" class="patch">
	<metadata>
		<title>security update for golang (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-61731" ref_url="https://www.suse.com/security/cve/CVE-2025-61731/" source="CVE"/>
		<reference ref_id="CVE-2026-25679" ref_url="https://www.suse.com/security/cve/CVE-2026-25679/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5942.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5942.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61731/">CVE-2025-61731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25679/">CVE-2026-25679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055826" comment="go-toolset-1.25.8-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055827" comment="golang-1.25.8-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055828" comment="golang-bin-1.25.8-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055829" comment="golang-docs-1.25.8-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055830" comment="golang-misc-1.25.8-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055831" comment="golang-race-1.25.8-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055832" comment="golang-src-1.25.8-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055833" comment="golang-tests-1.25.8-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4977" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-26955" ref_url="https://www.suse.com/security/cve/CVE-2026-26955/" source="CVE"/>
		<reference ref_id="CVE-2026-26965" ref_url="https://www.suse.com/security/cve/CVE-2026-26965/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6004.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6004.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26955/">CVE-2026-26955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26955">CVE-2026-26955 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26965/">CVE-2026-26965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26965">CVE-2026-26965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055834" comment="freerdp-2.11.7-1.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055835" comment="freerdp-devel-2.11.7-1.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055836" comment="freerdp-libs-2.11.7-1.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055837" comment="libwinpr-2.11.7-1.el9_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055838" comment="libwinpr-devel-2.11.7-1.el9_7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4978" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-38180" ref_url="https://www.suse.com/security/cve/CVE-2025-38180/" source="CVE"/>
		<reference ref_id="CVE-2025-40096" ref_url="https://www.suse.com/security/cve/CVE-2025-40096/" source="CVE"/>
		<reference ref_id="CVE-2026-23144" ref_url="https://www.suse.com/security/cve/CVE-2026-23144/" source="CVE"/>
		<reference ref_id="CVE-2026-23171" ref_url="https://www.suse.com/security/cve/CVE-2026-23171/" source="CVE"/>
		<reference ref_id="CVE-2026-23191" ref_url="https://www.suse.com/security/cve/CVE-2026-23191/" source="CVE"/>
		<reference ref_id="CVE-2026-23193" ref_url="https://www.suse.com/security/cve/CVE-2026-23193/" source="CVE"/>
		<reference ref_id="CVE-2026-23204" ref_url="https://www.suse.com/security/cve/CVE-2026-23204/" source="CVE"/>
		<reference ref_id="CVE-2026-23209" ref_url="https://www.suse.com/security/cve/CVE-2026-23209/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6153.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6153.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38180/">CVE-2025-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40096/">CVE-2025-40096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40096">CVE-2025-40096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23144/">CVE-2026-23144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23144">CVE-2026-23144 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23171/">CVE-2026-23171 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23171">CVE-2026-23171 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23191/">CVE-2026-23191 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23191">CVE-2026-23191 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23193/">CVE-2026-23193 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23193">CVE-2026-23193 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23204/">CVE-2026-23204 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23204">CVE-2026-23204 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23209/">CVE-2026-23209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23209">CVE-2026-23209 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055839" comment="kernel-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055840" comment="kernel-abi-stablelists-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055841" comment="kernel-core-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055842" comment="kernel-cross-headers-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055843" comment="kernel-debug-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055844" comment="kernel-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055845" comment="kernel-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055846" comment="kernel-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055847" comment="kernel-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055848" comment="kernel-debug-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055849" comment="kernel-doc-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055850" comment="kernel-headers-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055851" comment="kernel-modules-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055852" comment="kernel-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055853" comment="kernel-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055854" comment="kernel-rt-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055855" comment="kernel-rt-core-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055856" comment="kernel-rt-debug-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055857" comment="kernel-rt-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055858" comment="kernel-rt-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055859" comment="kernel-rt-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055860" comment="kernel-rt-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055861" comment="kernel-rt-modules-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055862" comment="kernel-rt-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055863" comment="kernel-rt-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055864" comment="kernel-tools-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055865" comment="kernel-tools-libs-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055866" comment="kernel-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055867" comment="kernel-uki-virt-addons-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055868" comment="libperf-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055869" comment="perf-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055870" comment="python3-perf-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055871" comment="rtla-5.14.0-611.45.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055872" comment="rv-5.14.0-611.45.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4979" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-3889" ref_url="https://www.suse.com/security/cve/CVE-2026-3889/" source="CVE"/>
		<reference ref_id="CVE-2026-4371" ref_url="https://www.suse.com/security/cve/CVE-2026-4371/" source="CVE"/>
		<reference ref_id="CVE-2026-4684" ref_url="https://www.suse.com/security/cve/CVE-2026-4684/" source="CVE"/>
		<reference ref_id="CVE-2026-4685" ref_url="https://www.suse.com/security/cve/CVE-2026-4685/" source="CVE"/>
		<reference ref_id="CVE-2026-4686" ref_url="https://www.suse.com/security/cve/CVE-2026-4686/" source="CVE"/>
		<reference ref_id="CVE-2026-4687" ref_url="https://www.suse.com/security/cve/CVE-2026-4687/" source="CVE"/>
		<reference ref_id="CVE-2026-4688" ref_url="https://www.suse.com/security/cve/CVE-2026-4688/" source="CVE"/>
		<reference ref_id="CVE-2026-4689" ref_url="https://www.suse.com/security/cve/CVE-2026-4689/" source="CVE"/>
		<reference ref_id="CVE-2026-4690" ref_url="https://www.suse.com/security/cve/CVE-2026-4690/" source="CVE"/>
		<reference ref_id="CVE-2026-4691" ref_url="https://www.suse.com/security/cve/CVE-2026-4691/" source="CVE"/>
		<reference ref_id="CVE-2026-4692" ref_url="https://www.suse.com/security/cve/CVE-2026-4692/" source="CVE"/>
		<reference ref_id="CVE-2026-4693" ref_url="https://www.suse.com/security/cve/CVE-2026-4693/" source="CVE"/>
		<reference ref_id="CVE-2026-4694" ref_url="https://www.suse.com/security/cve/CVE-2026-4694/" source="CVE"/>
		<reference ref_id="CVE-2026-4695" ref_url="https://www.suse.com/security/cve/CVE-2026-4695/" source="CVE"/>
		<reference ref_id="CVE-2026-4696" ref_url="https://www.suse.com/security/cve/CVE-2026-4696/" source="CVE"/>
		<reference ref_id="CVE-2026-4697" ref_url="https://www.suse.com/security/cve/CVE-2026-4697/" source="CVE"/>
		<reference ref_id="CVE-2026-4698" ref_url="https://www.suse.com/security/cve/CVE-2026-4698/" source="CVE"/>
		<reference ref_id="CVE-2026-4699" ref_url="https://www.suse.com/security/cve/CVE-2026-4699/" source="CVE"/>
		<reference ref_id="CVE-2026-4700" ref_url="https://www.suse.com/security/cve/CVE-2026-4700/" source="CVE"/>
		<reference ref_id="CVE-2026-4701" ref_url="https://www.suse.com/security/cve/CVE-2026-4701/" source="CVE"/>
		<reference ref_id="CVE-2026-4702" ref_url="https://www.suse.com/security/cve/CVE-2026-4702/" source="CVE"/>
		<reference ref_id="CVE-2026-4704" ref_url="https://www.suse.com/security/cve/CVE-2026-4704/" source="CVE"/>
		<reference ref_id="CVE-2026-4705" ref_url="https://www.suse.com/security/cve/CVE-2026-4705/" source="CVE"/>
		<reference ref_id="CVE-2026-4706" ref_url="https://www.suse.com/security/cve/CVE-2026-4706/" source="CVE"/>
		<reference ref_id="CVE-2026-4707" ref_url="https://www.suse.com/security/cve/CVE-2026-4707/" source="CVE"/>
		<reference ref_id="CVE-2026-4708" ref_url="https://www.suse.com/security/cve/CVE-2026-4708/" source="CVE"/>
		<reference ref_id="CVE-2026-4709" ref_url="https://www.suse.com/security/cve/CVE-2026-4709/" source="CVE"/>
		<reference ref_id="CVE-2026-4710" ref_url="https://www.suse.com/security/cve/CVE-2026-4710/" source="CVE"/>
		<reference ref_id="CVE-2026-4711" ref_url="https://www.suse.com/security/cve/CVE-2026-4711/" source="CVE"/>
		<reference ref_id="CVE-2026-4712" ref_url="https://www.suse.com/security/cve/CVE-2026-4712/" source="CVE"/>
		<reference ref_id="CVE-2026-4713" ref_url="https://www.suse.com/security/cve/CVE-2026-4713/" source="CVE"/>
		<reference ref_id="CVE-2026-4714" ref_url="https://www.suse.com/security/cve/CVE-2026-4714/" source="CVE"/>
		<reference ref_id="CVE-2026-4715" ref_url="https://www.suse.com/security/cve/CVE-2026-4715/" source="CVE"/>
		<reference ref_id="CVE-2026-4716" ref_url="https://www.suse.com/security/cve/CVE-2026-4716/" source="CVE"/>
		<reference ref_id="CVE-2026-4717" ref_url="https://www.suse.com/security/cve/CVE-2026-4717/" source="CVE"/>
		<reference ref_id="CVE-2026-4718" ref_url="https://www.suse.com/security/cve/CVE-2026-4718/" source="CVE"/>
		<reference ref_id="CVE-2026-4719" ref_url="https://www.suse.com/security/cve/CVE-2026-4719/" source="CVE"/>
		<reference ref_id="CVE-2026-4720" ref_url="https://www.suse.com/security/cve/CVE-2026-4720/" source="CVE"/>
		<reference ref_id="CVE-2026-4721" ref_url="https://www.suse.com/security/cve/CVE-2026-4721/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6188.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6188.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-3889/">CVE-2026-3889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3889">CVE-2026-3889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4371/">CVE-2026-4371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4371">CVE-2026-4371 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4684/">CVE-2026-4684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4684">CVE-2026-4684 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4685/">CVE-2026-4685 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4685">CVE-2026-4685 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4686/">CVE-2026-4686 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4686">CVE-2026-4686 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4687/">CVE-2026-4687 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4687">CVE-2026-4687 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4688/">CVE-2026-4688 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4688">CVE-2026-4688 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4689/">CVE-2026-4689 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4689">CVE-2026-4689 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4690/">CVE-2026-4690 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4690">CVE-2026-4690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4691/">CVE-2026-4691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4691">CVE-2026-4691 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4692/">CVE-2026-4692 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4692">CVE-2026-4692 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4693/">CVE-2026-4693 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4693">CVE-2026-4693 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4694/">CVE-2026-4694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4694">CVE-2026-4694 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4695/">CVE-2026-4695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4695">CVE-2026-4695 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4696/">CVE-2026-4696 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4696">CVE-2026-4696 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4697/">CVE-2026-4697 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4697">CVE-2026-4697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4698/">CVE-2026-4698 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4698">CVE-2026-4698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4699/">CVE-2026-4699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4699">CVE-2026-4699 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4700/">CVE-2026-4700 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4700">CVE-2026-4700 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4701/">CVE-2026-4701 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4701">CVE-2026-4701 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4702/">CVE-2026-4702 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4702">CVE-2026-4702 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-4704/">CVE-2026-4704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4704">CVE-2026-4704 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4705/">CVE-2026-4705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4705">CVE-2026-4705 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4706/">CVE-2026-4706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4706">CVE-2026-4706 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4707/">CVE-2026-4707 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4707">CVE-2026-4707 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4708/">CVE-2026-4708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4708">CVE-2026-4708 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4709/">CVE-2026-4709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4709">CVE-2026-4709 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4710/">CVE-2026-4710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4710">CVE-2026-4710 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4711/">CVE-2026-4711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4711">CVE-2026-4711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4712/">CVE-2026-4712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4712">CVE-2026-4712 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4713/">CVE-2026-4713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4713">CVE-2026-4713 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4714/">CVE-2026-4714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4714">CVE-2026-4714 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4715/">CVE-2026-4715 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4715">CVE-2026-4715 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4716/">CVE-2026-4716 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4716">CVE-2026-4716 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4717/">CVE-2026-4717 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4717">CVE-2026-4717 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4718/">CVE-2026-4718 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4718">CVE-2026-4718 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4719/">CVE-2026-4719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4719">CVE-2026-4719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4720/">CVE-2026-4720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4720">CVE-2026-4720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4721/">CVE-2026-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4721">CVE-2026-4721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4980" version="1" class="patch">
	<metadata>
		<title>security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2023-40403" ref_url="https://www.suse.com/security/cve/CVE-2023-40403/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6266.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6266.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-40403/">CVE-2023-40403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40403">CVE-2023-40403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055874" comment="libxslt-1.1.34-14.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055875" comment="libxslt-devel-1.1.34-14.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4981" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-4519" ref_url="https://www.suse.com/security/cve/CVE-2026-4519/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6285.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6285.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4519/">CVE-2026-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4519">CVE-2026-4519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055876" comment="python3.12-3.12.12-4.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055877" comment="python3.12-debug-3.12.12-4.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055878" comment="python3.12-devel-3.12.12-4.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055879" comment="python3.12-idle-3.12.12-4.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055880" comment="python3.12-libs-3.12.12-4.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055881" comment="python3.12-test-3.12.12-4.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055882" comment="python3.12-tkinter-3.12.12-4.el9_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4982" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-4519" ref_url="https://www.suse.com/security/cve/CVE-2026-4519/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6286.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6286.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4519/">CVE-2026-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4519">CVE-2026-4519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055883" comment="python3.11-3.11.13-5.2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055884" comment="python3.11-debug-3.11.13-5.2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055885" comment="python3.11-devel-3.11.13-5.2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055886" comment="python3.11-idle-3.11.13-5.2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055887" comment="python3.11-libs-3.11.13-5.2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055888" comment="python3.11-test-3.11.13-5.2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055889" comment="python3.11-tkinter-3.11.13-5.2.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4983" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-bad-free (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-2920" ref_url="https://www.suse.com/security/cve/CVE-2026-2920/" source="CVE"/>
		<reference ref_id="CVE-2026-2921" ref_url="https://www.suse.com/security/cve/CVE-2026-2921/" source="CVE"/>
		<reference ref_id="CVE-2026-2922" ref_url="https://www.suse.com/security/cve/CVE-2026-2922/" source="CVE"/>
		<reference ref_id="CVE-2026-2923" ref_url="https://www.suse.com/security/cve/CVE-2026-2923/" source="CVE"/>
		<reference ref_id="CVE-2026-3082" ref_url="https://www.suse.com/security/cve/CVE-2026-3082/" source="CVE"/>
		<reference ref_id="CVE-2026-3083" ref_url="https://www.suse.com/security/cve/CVE-2026-3083/" source="CVE"/>
		<reference ref_id="CVE-2026-3085" ref_url="https://www.suse.com/security/cve/CVE-2026-3085/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6300.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6300.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2920/">CVE-2026-2920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2920">CVE-2026-2920 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2921/">CVE-2026-2921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2921">CVE-2026-2921 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2922/">CVE-2026-2922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2922">CVE-2026-2922 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2923/">CVE-2026-2923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2923">CVE-2026-2923 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-3082/">CVE-2026-3082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3082">CVE-2026-3082 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-3083/">CVE-2026-3083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3083">CVE-2026-3083 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-3085/">CVE-2026-3085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3085">CVE-2026-3085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055890" comment="gstreamer1-plugins-bad-free-1.22.12-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055891" comment="gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055892" comment="gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055893" comment="gstreamer1-plugins-base-1.22.12-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055894" comment="gstreamer1-plugins-base-devel-1.22.12-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055895" comment="gstreamer1-plugins-base-tools-1.22.12-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055896" comment="gstreamer1-plugins-good-1.22.12-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055897" comment="gstreamer1-plugins-good-gtk-1.22.12-5.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055898" comment="gstreamer1-plugins-ugly-free-1.22.12-4.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4984" version="1" class="patch">
	<metadata>
		<title>security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-32748" ref_url="https://www.suse.com/security/cve/CVE-2026-32748/" source="CVE"/>
		<reference ref_id="CVE-2026-33526" ref_url="https://www.suse.com/security/cve/CVE-2026-33526/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6301.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6301.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32748/">CVE-2026-32748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32748">CVE-2026-32748 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33526/">CVE-2026-33526 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33526">CVE-2026-33526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055899" comment="squid-5.5-22.el9_7.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4985" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-22852" ref_url="https://www.suse.com/security/cve/CVE-2026-22852/" source="CVE"/>
		<reference ref_id="CVE-2026-22854" ref_url="https://www.suse.com/security/cve/CVE-2026-22854/" source="CVE"/>
		<reference ref_id="CVE-2026-22856" ref_url="https://www.suse.com/security/cve/CVE-2026-22856/" source="CVE"/>
		<reference ref_id="CVE-2026-23732" ref_url="https://www.suse.com/security/cve/CVE-2026-23732/" source="CVE"/>
		<reference ref_id="CVE-2026-23948" ref_url="https://www.suse.com/security/cve/CVE-2026-23948/" source="CVE"/>
		<reference ref_id="CVE-2026-24491" ref_url="https://www.suse.com/security/cve/CVE-2026-24491/" source="CVE"/>
		<reference ref_id="CVE-2026-24675" ref_url="https://www.suse.com/security/cve/CVE-2026-24675/" source="CVE"/>
		<reference ref_id="CVE-2026-24676" ref_url="https://www.suse.com/security/cve/CVE-2026-24676/" source="CVE"/>
		<reference ref_id="CVE-2026-24679" ref_url="https://www.suse.com/security/cve/CVE-2026-24679/" source="CVE"/>
		<reference ref_id="CVE-2026-24681" ref_url="https://www.suse.com/security/cve/CVE-2026-24681/" source="CVE"/>
		<reference ref_id="CVE-2026-24683" ref_url="https://www.suse.com/security/cve/CVE-2026-24683/" source="CVE"/>
		<reference ref_id="CVE-2026-24684" ref_url="https://www.suse.com/security/cve/CVE-2026-24684/" source="CVE"/>
		<reference ref_id="CVE-2026-31806" ref_url="https://www.suse.com/security/cve/CVE-2026-31806/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6340.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6340.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22852/">CVE-2026-22852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22852">CVE-2026-22852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22854/">CVE-2026-22854 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22854">CVE-2026-22854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22856/">CVE-2026-22856 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22856">CVE-2026-22856 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23732/">CVE-2026-23732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23732">CVE-2026-23732 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23948/">CVE-2026-23948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23948">CVE-2026-23948 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24491/">CVE-2026-24491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24491">CVE-2026-24491 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24675/">CVE-2026-24675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24675">CVE-2026-24675 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24676/">CVE-2026-24676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24676">CVE-2026-24676 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24679/">CVE-2026-24679 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24679">CVE-2026-24679 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24681/">CVE-2026-24681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24681">CVE-2026-24681 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24683/">CVE-2026-24683 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24683">CVE-2026-24683 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24684/">CVE-2026-24684 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24684">CVE-2026-24684 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31806/">CVE-2026-31806 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31806">CVE-2026-31806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4986" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-25679" ref_url="https://www.suse.com/security/cve/CVE-2026-25679/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6382.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6382.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25679/">CVE-2026-25679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055905" comment="grafana-10.2.6-19.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055906" comment="grafana-selinux-10.2.6-19.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4987" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-25679" ref_url="https://www.suse.com/security/cve/CVE-2026-25679/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6383.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6383.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25679/">CVE-2026-25679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055907" comment="grafana-pcp-5.1.1-13.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4988" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-10158" ref_url="https://www.suse.com/security/cve/CVE-2025-10158/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6390.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6390.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-10158/">CVE-2025-10158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10158">CVE-2025-10158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055908" comment="rsync-3.2.5-3.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055909" comment="rsync-daemon-3.2.5-3.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055910" comment="rsync-rrsync-3.2.5-3.el9_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4989" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-3497" ref_url="https://www.suse.com/security/cve/CVE-2026-3497/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6462.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6462.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3497/">CVE-2026-3497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3497">CVE-2026-3497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055911" comment="openssh-8.7p1-48.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055912" comment="openssh-askpass-8.7p1-48.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055913" comment="openssh-clients-8.7p1-48.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055914" comment="openssh-keycat-8.7p1-48.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055915" comment="openssh-server-8.7p1-48.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055916" comment="pam_ssh_agent_auth-0.10.4-5.48.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4990" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-38109" ref_url="https://www.suse.com/security/cve/CVE-2025-38109/" source="CVE"/>
		<reference ref_id="CVE-2026-23111" ref_url="https://www.suse.com/security/cve/CVE-2026-23111/" source="CVE"/>
		<reference ref_id="CVE-2026-23210" ref_url="https://www.suse.com/security/cve/CVE-2026-23210/" source="CVE"/>
		<reference ref_id="CVE-2026-23231" ref_url="https://www.suse.com/security/cve/CVE-2026-23231/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6570.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6570.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38109/">CVE-2025-38109 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38109">CVE-2025-38109 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23111/">CVE-2026-23111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23111">CVE-2026-23111 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23210/">CVE-2026-23210 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23210">CVE-2026-23210 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23231/">CVE-2026-23231 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23231">CVE-2026-23231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055917" comment="kernel-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055918" comment="kernel-abi-stablelists-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055919" comment="kernel-core-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055920" comment="kernel-cross-headers-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055921" comment="kernel-debug-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055922" comment="kernel-debug-core-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055923" comment="kernel-debug-modules-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055924" comment="kernel-debug-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055925" comment="kernel-debug-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055926" comment="kernel-debug-uki-virt-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055927" comment="kernel-doc-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055928" comment="kernel-headers-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055929" comment="kernel-modules-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055930" comment="kernel-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055931" comment="kernel-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055932" comment="kernel-rt-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055933" comment="kernel-rt-core-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055934" comment="kernel-rt-debug-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055935" comment="kernel-rt-debug-core-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055936" comment="kernel-rt-debug-modules-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055937" comment="kernel-rt-debug-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055938" comment="kernel-rt-debug-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055939" comment="kernel-rt-modules-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055940" comment="kernel-rt-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055941" comment="kernel-rt-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055942" comment="kernel-tools-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055943" comment="kernel-tools-libs-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055944" comment="kernel-uki-virt-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055945" comment="kernel-uki-virt-addons-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055946" comment="libperf-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055947" comment="perf-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055948" comment="python3-perf-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055949" comment="rtla-5.14.0-611.47.1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055950" comment="rv-5.14.0-611.47.1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4991" version="1" class="patch">
	<metadata>
		<title>security update for crun (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-30892" ref_url="https://www.suse.com/security/cve/CVE-2026-30892/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6621.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6621.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-30892/">CVE-2026-30892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30892">CVE-2026-30892 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055951" comment="crun-1.27-1.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4992" version="1" class="patch">
	<metadata>
		<title>security update for fontforge (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2025-15270" ref_url="https://www.suse.com/security/cve/CVE-2025-15270/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6628.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6628.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15270/">CVE-2025-15270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15270">CVE-2025-15270 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055952" comment="fontforge-20201107-8.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4993" version="1" class="patch">
	<metadata>
		<title>security update for python3.9 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-4519" ref_url="https://www.suse.com/security/cve/CVE-2026-4519/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6766.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6766.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4519/">CVE-2026-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4519">CVE-2026-4519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055953" comment="python-unversioned-command-3.9.25-3.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055954" comment="python3-3.9.25-3.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055955" comment="python3-debug-3.9.25-3.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055956" comment="python3-devel-3.9.25-3.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055957" comment="python3-idle-3.9.25-3.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055958" comment="python3-libs-3.9.25-3.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055959" comment="python3-test-3.9.25-3.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055960" comment="python3-tkinter-3.9.25-3.el9_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4994" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-27651" ref_url="https://www.suse.com/security/cve/CVE-2026-27651/" source="CVE"/>
		<reference ref_id="CVE-2026-27654" ref_url="https://www.suse.com/security/cve/CVE-2026-27654/" source="CVE"/>
		<reference ref_id="CVE-2026-27784" ref_url="https://www.suse.com/security/cve/CVE-2026-27784/" source="CVE"/>
		<reference ref_id="CVE-2026-32647" ref_url="https://www.suse.com/security/cve/CVE-2026-32647/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6923.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6923.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27651/">CVE-2026-27651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27651">CVE-2026-27651 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27654/">CVE-2026-27654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27654">CVE-2026-27654 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27784/">CVE-2026-27784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27784">CVE-2026-27784 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32647/">CVE-2026-32647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32647">CVE-2026-32647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055961" comment="nginx-1.24.0-5.module+el9.7.0+24151+c43a3acf.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055962" comment="nginx-all-modules-1.24.0-5.module+el9.7.0+24151+c43a3acf.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055963" comment="nginx-core-1.24.0-5.module+el9.7.0+24151+c43a3acf.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055964" comment="nginx-filesystem-1.24.0-5.module+el9.7.0+24151+c43a3acf.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055965" comment="nginx-mod-devel-1.24.0-5.module+el9.7.0+24151+c43a3acf.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055966" comment="nginx-mod-http-image-filter-1.24.0-5.module+el9.7.0+24151+c43a3acf.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055967" comment="nginx-mod-http-perl-1.24.0-5.module+el9.7.0+24151+c43a3acf.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055968" comment="nginx-mod-http-xslt-filter-1.24.0-5.module+el9.7.0+24151+c43a3acf.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055969" comment="nginx-mod-mail-1.24.0-5.module+el9.7.0+24151+c43a3acf.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055970" comment="nginx-mod-stream-1.24.0-5.module+el9.7.0+24151+c43a3acf.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4995" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-27651" ref_url="https://www.suse.com/security/cve/CVE-2026-27651/" source="CVE"/>
		<reference ref_id="CVE-2026-27654" ref_url="https://www.suse.com/security/cve/CVE-2026-27654/" source="CVE"/>
		<reference ref_id="CVE-2026-27784" ref_url="https://www.suse.com/security/cve/CVE-2026-27784/" source="CVE"/>
		<reference ref_id="CVE-2026-32647" ref_url="https://www.suse.com/security/cve/CVE-2026-32647/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7002.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7002.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27651/">CVE-2026-27651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27651">CVE-2026-27651 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27654/">CVE-2026-27654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27654">CVE-2026-27654 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27784/">CVE-2026-27784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27784">CVE-2026-27784 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32647/">CVE-2026-32647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32647">CVE-2026-32647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055971" comment="nginx-1.20.1-24.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055972" comment="nginx-all-modules-1.20.1-24.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055973" comment="nginx-core-1.20.1-24.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055974" comment="nginx-filesystem-1.20.1-24.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055975" comment="nginx-mod-devel-1.20.1-24.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055976" comment="nginx-mod-http-image-filter-1.20.1-24.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055977" comment="nginx-mod-http-perl-1.20.1-24.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055978" comment="nginx-mod-http-xslt-filter-1.20.1-24.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055979" comment="nginx-mod-mail-1.20.1-24.el9_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055980" comment="nginx-mod-stream-1.20.1-24.el9_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4996" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-25679" ref_url="https://www.suse.com/security/cve/CVE-2026-25679/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7259.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7259.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25679/">CVE-2026-25679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055981" comment="git-lfs-3.6.1-8.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4997" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-1525" ref_url="https://www.suse.com/security/cve/CVE-2026-1525/" source="CVE"/>
		<reference ref_id="CVE-2026-1526" ref_url="https://www.suse.com/security/cve/CVE-2026-1526/" source="CVE"/>
		<reference ref_id="CVE-2026-1528" ref_url="https://www.suse.com/security/cve/CVE-2026-1528/" source="CVE"/>
		<reference ref_id="CVE-2026-21710" ref_url="https://www.suse.com/security/cve/CVE-2026-21710/" source="CVE"/>
		<reference ref_id="CVE-2026-2229" ref_url="https://www.suse.com/security/cve/CVE-2026-2229/" source="CVE"/>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<reference ref_id="CVE-2026-26996" ref_url="https://www.suse.com/security/cve/CVE-2026-26996/" source="CVE"/>
		<reference ref_id="CVE-2026-27135" ref_url="https://www.suse.com/security/cve/CVE-2026-27135/" source="CVE"/>
		<reference ref_id="CVE-2026-27904" ref_url="https://www.suse.com/security/cve/CVE-2026-27904/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7302.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7302.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1525/">CVE-2026-1525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1525">CVE-2026-1525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1526/">CVE-2026-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1526">CVE-2026-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1528/">CVE-2026-1528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1528">CVE-2026-1528 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21710/">CVE-2026-21710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21710">CVE-2026-21710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2229/">CVE-2026-2229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2229">CVE-2026-2229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-26996/">CVE-2026-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26996">CVE-2026-26996 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27135/">CVE-2026-27135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27135">CVE-2026-27135 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27904/">CVE-2026-27904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27904">CVE-2026-27904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055982" comment="nodejs-22.22.2-1.module+el9.7.0+24157+8ddb2461 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055983" comment="nodejs-devel-22.22.2-1.module+el9.7.0+24157+8ddb2461 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055984" comment="nodejs-docs-22.22.2-1.module+el9.7.0+24157+8ddb2461 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055985" comment="nodejs-full-i18n-22.22.2-1.module+el9.7.0+24157+8ddb2461 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055986" comment="nodejs-libs-22.22.2-1.module+el9.7.0+24157+8ddb2461 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055987" comment="nodejs-nodemon-3.0.1-1.module+el9.7.0+24157+8ddb2461 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055988" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24157+8ddb2461 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055989" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24157+8ddb2461 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055990" comment="npm-10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055991" comment="v8-12.4-devel-12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4998" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-27651" ref_url="https://www.suse.com/security/cve/CVE-2026-27651/" source="CVE"/>
		<reference ref_id="CVE-2026-27654" ref_url="https://www.suse.com/security/cve/CVE-2026-27654/" source="CVE"/>
		<reference ref_id="CVE-2026-27784" ref_url="https://www.suse.com/security/cve/CVE-2026-27784/" source="CVE"/>
		<reference ref_id="CVE-2026-32647" ref_url="https://www.suse.com/security/cve/CVE-2026-32647/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7343.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7343.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27651/">CVE-2026-27651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27651">CVE-2026-27651 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27654/">CVE-2026-27654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27654">CVE-2026-27654 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27784/">CVE-2026-27784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27784">CVE-2026-27784 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32647/">CVE-2026-32647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32647">CVE-2026-32647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010055992" comment="nginx-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055993" comment="nginx-all-modules-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055994" comment="nginx-core-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055995" comment="nginx-filesystem-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055996" comment="nginx-mod-devel-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055997" comment="nginx-mod-http-image-filter-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055998" comment="nginx-mod-http-perl-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010055999" comment="nginx-mod-http-xslt-filter-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056000" comment="nginx-mod-mail-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056001" comment="nginx-mod-stream-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4999" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-1525" ref_url="https://www.suse.com/security/cve/CVE-2026-1525/" source="CVE"/>
		<reference ref_id="CVE-2026-1526" ref_url="https://www.suse.com/security/cve/CVE-2026-1526/" source="CVE"/>
		<reference ref_id="CVE-2026-1527" ref_url="https://www.suse.com/security/cve/CVE-2026-1527/" source="CVE"/>
		<reference ref_id="CVE-2026-1528" ref_url="https://www.suse.com/security/cve/CVE-2026-1528/" source="CVE"/>
		<reference ref_id="CVE-2026-21637" ref_url="https://www.suse.com/security/cve/CVE-2026-21637/" source="CVE"/>
		<reference ref_id="CVE-2026-21710" ref_url="https://www.suse.com/security/cve/CVE-2026-21710/" source="CVE"/>
		<reference ref_id="CVE-2026-21711" ref_url="https://www.suse.com/security/cve/CVE-2026-21711/" source="CVE"/>
		<reference ref_id="CVE-2026-21712" ref_url="https://www.suse.com/security/cve/CVE-2026-21712/" source="CVE"/>
		<reference ref_id="CVE-2026-21713" ref_url="https://www.suse.com/security/cve/CVE-2026-21713/" source="CVE"/>
		<reference ref_id="CVE-2026-21714" ref_url="https://www.suse.com/security/cve/CVE-2026-21714/" source="CVE"/>
		<reference ref_id="CVE-2026-21715" ref_url="https://www.suse.com/security/cve/CVE-2026-21715/" source="CVE"/>
		<reference ref_id="CVE-2026-21716" ref_url="https://www.suse.com/security/cve/CVE-2026-21716/" source="CVE"/>
		<reference ref_id="CVE-2026-21717" ref_url="https://www.suse.com/security/cve/CVE-2026-21717/" source="CVE"/>
		<reference ref_id="CVE-2026-2229" ref_url="https://www.suse.com/security/cve/CVE-2026-2229/" source="CVE"/>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<reference ref_id="CVE-2026-2581" ref_url="https://www.suse.com/security/cve/CVE-2026-2581/" source="CVE"/>
		<reference ref_id="CVE-2026-26996" ref_url="https://www.suse.com/security/cve/CVE-2026-26996/" source="CVE"/>
		<reference ref_id="CVE-2026-27135" ref_url="https://www.suse.com/security/cve/CVE-2026-27135/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7350.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7350.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1525/">CVE-2026-1525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1525">CVE-2026-1525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1526/">CVE-2026-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1526">CVE-2026-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1527/">CVE-2026-1527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1527">CVE-2026-1527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1528/">CVE-2026-1528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1528">CVE-2026-1528 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21637/">CVE-2026-21637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21637">CVE-2026-21637 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21710/">CVE-2026-21710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21710">CVE-2026-21710 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21711/">CVE-2026-21711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21711">CVE-2026-21711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21712/">CVE-2026-21712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21712">CVE-2026-21712 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21713/">CVE-2026-21713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21713">CVE-2026-21713 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21714/">CVE-2026-21714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21714">CVE-2026-21714 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21715/">CVE-2026-21715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21715">CVE-2026-21715 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21716/">CVE-2026-21716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21716">CVE-2026-21716 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21717/">CVE-2026-21717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21717">CVE-2026-21717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2229/">CVE-2026-2229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2229">CVE-2026-2229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2581/">CVE-2026-2581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2581">CVE-2026-2581 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-26996/">CVE-2026-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26996">CVE-2026-26996 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27135/">CVE-2026-27135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27135">CVE-2026-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5000" version="1" class="patch">
	<metadata>
		<title>security update for cockpit (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-4631" ref_url="https://www.suse.com/security/cve/CVE-2026-4631/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7384.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7384.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4631/">CVE-2026-4631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4631">CVE-2026-4631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056205" comment="cockpit-344-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056206" comment="cockpit-bridge-344-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056207" comment="cockpit-doc-344-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056208" comment="cockpit-packagekit-344-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056209" comment="cockpit-storaged-344-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056210" comment="cockpit-system-344-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056211" comment="cockpit-ws-344-2.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056212" comment="cockpit-ws-selinux-344-2.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5001" version="1" class="patch">
	<metadata>
		<title>security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-27135" ref_url="https://www.suse.com/security/cve/CVE-2026-27135/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7668.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7668.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27135/">CVE-2026-27135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27135">CVE-2026-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056598" comment="libnghttp2-1.43.0-6.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056599" comment="libnghttp2-devel-1.43.0-6.el9_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056600" comment="nghttp2-1.43.0-6.el9_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5002" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-33416" ref_url="https://www.suse.com/security/cve/CVE-2026-33416/" source="CVE"/>
		<reference ref_id="CVE-2026-33636" ref_url="https://www.suse.com/security/cve/CVE-2026-33636/" source="CVE"/>
		<reference ref_id="CVE-2026-5731" ref_url="https://www.suse.com/security/cve/CVE-2026-5731/" source="CVE"/>
		<reference ref_id="CVE-2026-5732" ref_url="https://www.suse.com/security/cve/CVE-2026-5732/" source="CVE"/>
		<reference ref_id="CVE-2026-5734" ref_url="https://www.suse.com/security/cve/CVE-2026-5734/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7671.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7671.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33416/">CVE-2026-33416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33416">CVE-2026-33416 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33636/">CVE-2026-33636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33636">CVE-2026-33636 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5731/">CVE-2026-5731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5731">CVE-2026-5731 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5732/">CVE-2026-5732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5732">CVE-2026-5732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5734/">CVE-2026-5734 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-5734">CVE-2026-5734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056376" comment="firefox-140.9.1-1.el9_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056377" comment="firefox-x11-140.9.1-1.el9_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5003" version="1" class="patch">
	<metadata>
		<title>security update for perl-XML-Parser (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2006-10002" ref_url="https://www.suse.com/security/cve/CVE-2006-10002/" source="CVE"/>
		<reference ref_id="CVE-2006-10003" ref_url="https://www.suse.com/security/cve/CVE-2006-10003/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7679.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7679.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2006-10002/">CVE-2006-10002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-10002">CVE-2006-10002 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2006-10003/">CVE-2006-10003 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-10003">CVE-2006-10003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056601" comment="perl-XML-Parser-2.46-9.1.el9_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5004" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-21710" ref_url="https://www.suse.com/security/cve/CVE-2026-21710/" source="CVE"/>
		<reference ref_id="CVE-2026-26996" ref_url="https://www.suse.com/security/cve/CVE-2026-26996/" source="CVE"/>
		<reference ref_id="CVE-2026-27135" ref_url="https://www.suse.com/security/cve/CVE-2026-27135/" source="CVE"/>
		<reference ref_id="CVE-2026-27904" ref_url="https://www.suse.com/security/cve/CVE-2026-27904/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7896.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7896.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21710/">CVE-2026-21710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21710">CVE-2026-21710 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-26996/">CVE-2026-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26996">CVE-2026-26996 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27135/">CVE-2026-27135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27135">CVE-2026-27135 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27904/">CVE-2026-27904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27904">CVE-2026-27904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056602" comment="nodejs-20.20.2-1.module+el9.7.0+24193+41b7b572 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056603" comment="nodejs-devel-20.20.2-1.module+el9.7.0+24193+41b7b572 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056604" comment="nodejs-docs-20.20.2-1.module+el9.7.0+24193+41b7b572 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056605" comment="nodejs-full-i18n-20.20.2-1.module+el9.7.0+24193+41b7b572 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056606" comment="nodejs-nodemon-3.0.1-1.module+el9.7.0+24193+41b7b572 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056607" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24193+41b7b572 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056608" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24193+41b7b572 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056609" comment="npm-10.8.2-1.20.20.2.1.module+el9.7.0+24193+41b7b572 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5005" version="1" class="patch">
	<metadata>
		<title>security update for bind9.18 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 9</platform>
		</affected>
		<reference ref_id="CVE-2026-1519" ref_url="https://www.suse.com/security/cve/CVE-2026-1519/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7915.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7915.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1519/">CVE-2026-1519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1519">CVE-2026-1519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056610" comment="bind9.18-9.18.29-5.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056611" comment="bind9.18-chroot-9.18.29-5.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056612" comment="bind9.18-devel-9.18.29-5.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056613" comment="bind9.18-dnssec-utils-9.18.29-5.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056614" comment="bind9.18-doc-9.18.29-5.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056615" comment="bind9.18-libs-9.18.29-5.el9_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056616" comment="bind9.18-utils-9.18.29-5.el9_7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804127" version="1" comment="open-vm-tools is &lt;12.1.5-1.el9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804128" version="1" comment="open-vm-tools-desktop is &lt;12.1.5-1.el9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804129" version="1" comment="open-vm-tools-devel is &lt;12.1.5-1.el9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804130" version="1" comment="open-vm-tools-salt-minion is &lt;12.1.5-1.el9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804131" version="1" comment="open-vm-tools-sdmp is &lt;12.1.5-1.el9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804132" version="1" comment="open-vm-tools-test is &lt;12.1.5-1.el9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804133" version="1" comment="sll-release is &gt;=9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947411" version="1" comment="shim-x64 is &lt;15.8-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965018" version="1" comment="python3-tbb is &lt;2020.3-8.el9_5.1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965019" version="1" comment="tbb is &lt;2020.3-8.el9_5.1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965020" version="1" comment="tbb-devel is &lt;2020.3-8.el9_5.1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965021" version="1" comment="tbb-doc is &lt;2020.3-8.el9_5.1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965022" version="1" comment="gcc-toolset-14-gcc is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965023" version="1" comment="gcc-toolset-14-gcc-c++ is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965024" version="1" comment="gcc-toolset-14-gcc-gfortran is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965025" version="1" comment="gcc-toolset-14-gcc-plugin-annobin is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965026" version="1" comment="gcc-toolset-14-gcc-plugin-devel is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965027" version="1" comment="gcc-toolset-14-libasan-devel is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965028" version="1" comment="gcc-toolset-14-libatomic-devel is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965029" version="1" comment="gcc-toolset-14-libgccjit is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965030" version="1" comment="gcc-toolset-14-libgccjit-devel is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965031" version="1" comment="gcc-toolset-14-libhwasan-devel is &lt;14.2.1-1.3.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965032" version="1" comment="gcc-toolset-14-libitm-devel is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965033" version="1" comment="gcc-toolset-14-liblsan-devel is &lt;14.2.1-1.3.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965034" version="1" comment="gcc-toolset-14-libquadmath-devel is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965035" version="1" comment="gcc-toolset-14-libstdc++-devel is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965036" version="1" comment="gcc-toolset-14-libstdc++-docs is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965037" version="1" comment="gcc-toolset-14-libtsan-devel is &lt;14.2.1-1.3.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965038" version="1" comment="gcc-toolset-14-libubsan-devel is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965039" version="1" comment="gcc-toolset-14-offload-nvptx is &lt;14.2.1-1.3.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965040" version="1" comment="libasan8 is &lt;14.2.1-1.3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965041" version="1" comment="libhwasan is &lt;14.2.1-1.3.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965042" version="1" comment="libtsan2 is &lt;14.2.1-1.3.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965043" version="1" comment="gcc-toolset-13-gcc is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965044" version="1" comment="gcc-toolset-13-gcc-c++ is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965045" version="1" comment="gcc-toolset-13-gcc-gfortran is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965046" version="1" comment="gcc-toolset-13-gcc-plugin-annobin is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965047" version="1" comment="gcc-toolset-13-gcc-plugin-devel is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965048" version="1" comment="gcc-toolset-13-libasan-devel is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965049" version="1" comment="gcc-toolset-13-libatomic-devel is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965050" version="1" comment="gcc-toolset-13-libgccjit is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965051" version="1" comment="gcc-toolset-13-libgccjit-devel is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965052" version="1" comment="gcc-toolset-13-libhwasan-devel is &lt;13.3.1-2.2.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965053" version="1" comment="gcc-toolset-13-libitm-devel is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965054" version="1" comment="gcc-toolset-13-liblsan-devel is &lt;13.3.1-2.2.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965055" version="1" comment="gcc-toolset-13-libquadmath-devel is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965056" version="1" comment="gcc-toolset-13-libstdc++-devel is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965057" version="1" comment="gcc-toolset-13-libstdc++-docs is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965058" version="1" comment="gcc-toolset-13-libtsan-devel is &lt;13.3.1-2.2.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965059" version="1" comment="gcc-toolset-13-libubsan-devel is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965060" version="1" comment="gcc-toolset-13-offload-nvptx is &lt;13.3.1-2.2.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965061" version="1" comment="libasan8 is &lt;13.3.1-2.2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965062" version="1" comment="libhwasan is &lt;13.3.1-2.2.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965063" version="1" comment="libtsan2 is &lt;13.3.1-2.2.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985809" version="1" comment="pcs is &lt;0.11.9-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985810" version="1" comment="pcs-snmp is &lt;0.11.9-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053614" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053615" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053616" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053617" version="1" comment="dotnet-host is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053618" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053619" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053620" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.107-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053621" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.107-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053622" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053623" version="1" comment="dotnet-templates-6.0 is &lt;6.0.107-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053624" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.107-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053625" version="1" comment="pki-servlet-4.0-api is &lt;9.0.50-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053626" version="1" comment="pki-servlet-engine is &lt;9.0.50-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053627" version="1" comment="qatzip is &lt;1.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053628" version="1" comment="qatzip-devel is &lt;1.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053629" version="1" comment="qatzip-libs is &lt;1.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053630" version="1" comment="expat is &lt;2.4.9-1.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053631" version="1" comment="expat-devel is &lt;2.4.9-1.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053632" version="1" comment="microcode_ctl is &lt;20220809-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053633" version="1" comment="delve is &lt;1.9.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053634" version="1" comment="go-toolset is &lt;1.19.6-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053635" version="1" comment="golang is &lt;1.19.6-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053636" version="1" comment="golang-bin is &lt;1.19.6-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053637" version="1" comment="golang-docs is &lt;1.19.6-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053638" version="1" comment="golang-misc is &lt;1.19.6-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053639" version="1" comment="golang-race is &lt;1.19.6-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053640" version="1" comment="golang-src is &lt;1.19.6-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053641" version="1" comment="golang-tests is &lt;1.19.6-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053642" version="1" comment="delve is &lt;1.20.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053643" version="1" comment="go-toolset is &lt;1.20.10-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053644" version="1" comment="golang is &lt;1.20.10-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053645" version="1" comment="golang-bin is &lt;1.20.10-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053646" version="1" comment="golang-docs is &lt;1.20.10-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053647" version="1" comment="golang-misc is &lt;1.20.10-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053648" version="1" comment="golang-src is &lt;1.20.10-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053649" version="1" comment="golang-tests is &lt;1.20.10-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053650" version="1" comment="libssh is &lt;0.10.4-12.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053651" version="1" comment="libssh-config is &lt;0.10.4-12.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053652" version="1" comment="libssh-devel is &lt;0.10.4-12.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053653" version="1" comment="podman is &lt;4.6.1-8.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053654" version="1" comment="podman-docker is &lt;4.6.1-8.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053655" version="1" comment="podman-gvproxy is &lt;4.6.1-8.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053656" version="1" comment="podman-plugins is &lt;4.6.1-8.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053657" version="1" comment="podman-remote is &lt;4.6.1-8.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053658" version="1" comment="podman-tests is &lt;4.6.1-8.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053659" version="1" comment="git-lfs is &lt;3.4.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053660" version="1" comment="glibc is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053661" version="1" comment="glibc-all-langpacks is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053662" version="1" comment="glibc-benchtests is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053663" version="1" comment="glibc-common is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053664" version="1" comment="glibc-devel is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053665" version="1" comment="glibc-doc is &lt;2.34-100.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053666" version="1" comment="glibc-gconv-extra is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053667" version="1" comment="glibc-headers is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053668" version="1" comment="glibc-langpack-aa is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053669" version="1" comment="glibc-langpack-af is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053670" version="1" comment="glibc-langpack-agr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053671" version="1" comment="glibc-langpack-ak is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053672" version="1" comment="glibc-langpack-am is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053673" version="1" comment="glibc-langpack-an is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053674" version="1" comment="glibc-langpack-anp is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053675" version="1" comment="glibc-langpack-ar is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053676" version="1" comment="glibc-langpack-as is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053677" version="1" comment="glibc-langpack-ast is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053678" version="1" comment="glibc-langpack-ayc is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053679" version="1" comment="glibc-langpack-az is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053680" version="1" comment="glibc-langpack-be is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053681" version="1" comment="glibc-langpack-bem is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053682" version="1" comment="glibc-langpack-ber is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053683" version="1" comment="glibc-langpack-bg is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053684" version="1" comment="glibc-langpack-bhb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053685" version="1" comment="glibc-langpack-bho is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053686" version="1" comment="glibc-langpack-bi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053687" version="1" comment="glibc-langpack-bn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053688" version="1" comment="glibc-langpack-bo is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053689" version="1" comment="glibc-langpack-br is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053690" version="1" comment="glibc-langpack-brx is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053691" version="1" comment="glibc-langpack-bs is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053692" version="1" comment="glibc-langpack-byn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053693" version="1" comment="glibc-langpack-ca is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053694" version="1" comment="glibc-langpack-ce is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053695" version="1" comment="glibc-langpack-chr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053696" version="1" comment="glibc-langpack-ckb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053697" version="1" comment="glibc-langpack-cmn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053698" version="1" comment="glibc-langpack-crh is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053699" version="1" comment="glibc-langpack-cs is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053700" version="1" comment="glibc-langpack-csb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053701" version="1" comment="glibc-langpack-cv is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053702" version="1" comment="glibc-langpack-cy is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053703" version="1" comment="glibc-langpack-da is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053704" version="1" comment="glibc-langpack-de is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053705" version="1" comment="glibc-langpack-doi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053706" version="1" comment="glibc-langpack-dsb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053707" version="1" comment="glibc-langpack-dv is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053708" version="1" comment="glibc-langpack-dz is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053709" version="1" comment="glibc-langpack-el is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053710" version="1" comment="glibc-langpack-en is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053711" version="1" comment="glibc-langpack-eo is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053712" version="1" comment="glibc-langpack-es is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053713" version="1" comment="glibc-langpack-et is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053714" version="1" comment="glibc-langpack-eu is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053715" version="1" comment="glibc-langpack-fa is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053716" version="1" comment="glibc-langpack-ff is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053717" version="1" comment="glibc-langpack-fi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053718" version="1" comment="glibc-langpack-fil is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053719" version="1" comment="glibc-langpack-fo is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053720" version="1" comment="glibc-langpack-fr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053721" version="1" comment="glibc-langpack-fur is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053722" version="1" comment="glibc-langpack-fy is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053723" version="1" comment="glibc-langpack-ga is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053724" version="1" comment="glibc-langpack-gd is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053725" version="1" comment="glibc-langpack-gez is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053726" version="1" comment="glibc-langpack-gl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053727" version="1" comment="glibc-langpack-gu is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053728" version="1" comment="glibc-langpack-gv is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053729" version="1" comment="glibc-langpack-ha is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053730" version="1" comment="glibc-langpack-hak is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053731" version="1" comment="glibc-langpack-he is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053732" version="1" comment="glibc-langpack-hi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053733" version="1" comment="glibc-langpack-hif is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053734" version="1" comment="glibc-langpack-hne is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053735" version="1" comment="glibc-langpack-hr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053736" version="1" comment="glibc-langpack-hsb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053737" version="1" comment="glibc-langpack-ht is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053738" version="1" comment="glibc-langpack-hu is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053739" version="1" comment="glibc-langpack-hy is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053740" version="1" comment="glibc-langpack-ia is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053741" version="1" comment="glibc-langpack-id is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053742" version="1" comment="glibc-langpack-ig is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053743" version="1" comment="glibc-langpack-ik is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053744" version="1" comment="glibc-langpack-is is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053745" version="1" comment="glibc-langpack-it is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053746" version="1" comment="glibc-langpack-iu is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053747" version="1" comment="glibc-langpack-ja is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053748" version="1" comment="glibc-langpack-ka is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053749" version="1" comment="glibc-langpack-kab is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053750" version="1" comment="glibc-langpack-kk is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053751" version="1" comment="glibc-langpack-kl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053752" version="1" comment="glibc-langpack-km is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053753" version="1" comment="glibc-langpack-kn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053754" version="1" comment="glibc-langpack-ko is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053755" version="1" comment="glibc-langpack-kok is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053756" version="1" comment="glibc-langpack-ks is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053757" version="1" comment="glibc-langpack-ku is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053758" version="1" comment="glibc-langpack-kw is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053759" version="1" comment="glibc-langpack-ky is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053760" version="1" comment="glibc-langpack-lb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053761" version="1" comment="glibc-langpack-lg is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053762" version="1" comment="glibc-langpack-li is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053763" version="1" comment="glibc-langpack-lij is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053764" version="1" comment="glibc-langpack-ln is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053765" version="1" comment="glibc-langpack-lo is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053766" version="1" comment="glibc-langpack-lt is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053767" version="1" comment="glibc-langpack-lv is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053768" version="1" comment="glibc-langpack-lzh is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053769" version="1" comment="glibc-langpack-mag is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053770" version="1" comment="glibc-langpack-mai is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053771" version="1" comment="glibc-langpack-mfe is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053772" version="1" comment="glibc-langpack-mg is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053773" version="1" comment="glibc-langpack-mhr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053774" version="1" comment="glibc-langpack-mi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053775" version="1" comment="glibc-langpack-miq is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053776" version="1" comment="glibc-langpack-mjw is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053777" version="1" comment="glibc-langpack-mk is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053778" version="1" comment="glibc-langpack-ml is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053779" version="1" comment="glibc-langpack-mn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053780" version="1" comment="glibc-langpack-mni is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053781" version="1" comment="glibc-langpack-mnw is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053782" version="1" comment="glibc-langpack-mr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053783" version="1" comment="glibc-langpack-ms is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053784" version="1" comment="glibc-langpack-mt is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053785" version="1" comment="glibc-langpack-my is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053786" version="1" comment="glibc-langpack-nan is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053787" version="1" comment="glibc-langpack-nb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053788" version="1" comment="glibc-langpack-nds is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053789" version="1" comment="glibc-langpack-ne is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053790" version="1" comment="glibc-langpack-nhn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053791" version="1" comment="glibc-langpack-niu is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053792" version="1" comment="glibc-langpack-nl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053793" version="1" comment="glibc-langpack-nn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053794" version="1" comment="glibc-langpack-nr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053795" version="1" comment="glibc-langpack-nso is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053796" version="1" comment="glibc-langpack-oc is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053797" version="1" comment="glibc-langpack-om is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053798" version="1" comment="glibc-langpack-or is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053799" version="1" comment="glibc-langpack-os is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053800" version="1" comment="glibc-langpack-pa is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053801" version="1" comment="glibc-langpack-pap is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053802" version="1" comment="glibc-langpack-pl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053803" version="1" comment="glibc-langpack-ps is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053804" version="1" comment="glibc-langpack-pt is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053805" version="1" comment="glibc-langpack-quz is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053806" version="1" comment="glibc-langpack-raj is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053807" version="1" comment="glibc-langpack-ro is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053808" version="1" comment="glibc-langpack-ru is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053809" version="1" comment="glibc-langpack-rw is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053810" version="1" comment="glibc-langpack-sa is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053811" version="1" comment="glibc-langpack-sah is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053812" version="1" comment="glibc-langpack-sat is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053813" version="1" comment="glibc-langpack-sc is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053814" version="1" comment="glibc-langpack-sd is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053815" version="1" comment="glibc-langpack-se is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053816" version="1" comment="glibc-langpack-sgs is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053817" version="1" comment="glibc-langpack-shn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053818" version="1" comment="glibc-langpack-shs is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053819" version="1" comment="glibc-langpack-si is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053820" version="1" comment="glibc-langpack-sid is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053821" version="1" comment="glibc-langpack-sk is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053822" version="1" comment="glibc-langpack-sl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053823" version="1" comment="glibc-langpack-sm is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053824" version="1" comment="glibc-langpack-so is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053825" version="1" comment="glibc-langpack-sq is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053826" version="1" comment="glibc-langpack-sr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053827" version="1" comment="glibc-langpack-ss is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053828" version="1" comment="glibc-langpack-st is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053829" version="1" comment="glibc-langpack-sv is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053830" version="1" comment="glibc-langpack-sw is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053831" version="1" comment="glibc-langpack-szl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053832" version="1" comment="glibc-langpack-ta is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053833" version="1" comment="glibc-langpack-tcy is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053834" version="1" comment="glibc-langpack-te is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053835" version="1" comment="glibc-langpack-tg is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053836" version="1" comment="glibc-langpack-th is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053837" version="1" comment="glibc-langpack-the is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053838" version="1" comment="glibc-langpack-ti is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053839" version="1" comment="glibc-langpack-tig is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053840" version="1" comment="glibc-langpack-tk is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053841" version="1" comment="glibc-langpack-tl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053842" version="1" comment="glibc-langpack-tn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053843" version="1" comment="glibc-langpack-to is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053844" version="1" comment="glibc-langpack-tpi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053845" version="1" comment="glibc-langpack-tr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053846" version="1" comment="glibc-langpack-ts is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053847" version="1" comment="glibc-langpack-tt is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053848" version="1" comment="glibc-langpack-ug is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053849" version="1" comment="glibc-langpack-uk is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053850" version="1" comment="glibc-langpack-unm is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053851" version="1" comment="glibc-langpack-ur is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053852" version="1" comment="glibc-langpack-uz is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053853" version="1" comment="glibc-langpack-ve is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053854" version="1" comment="glibc-langpack-vi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053855" version="1" comment="glibc-langpack-wa is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053856" version="1" comment="glibc-langpack-wae is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053857" version="1" comment="glibc-langpack-wal is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053858" version="1" comment="glibc-langpack-wo is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053859" version="1" comment="glibc-langpack-xh is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053860" version="1" comment="glibc-langpack-yi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053861" version="1" comment="glibc-langpack-yo is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053862" version="1" comment="glibc-langpack-yue is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053863" version="1" comment="glibc-langpack-yuw is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053864" version="1" comment="glibc-langpack-zh is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053865" version="1" comment="glibc-langpack-zu is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053866" version="1" comment="glibc-locale-source is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053867" version="1" comment="glibc-minimal-langpack is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053868" version="1" comment="glibc-nss-devel is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053869" version="1" comment="glibc-static is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053870" version="1" comment="glibc-utils is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053871" version="1" comment="libnsl is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053872" version="1" comment="nscd is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053873" version="1" comment="nss_db is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053874" version="1" comment="nss_hesiod is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053875" version="1" comment="expat is &lt;2.5.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053876" version="1" comment="expat-devel is &lt;2.5.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053877" version="1" comment="go-toolset is &lt;1.21.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053878" version="1" comment="golang is &lt;1.21.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053879" version="1" comment="golang-bin is &lt;1.21.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053880" version="1" comment="golang-docs is &lt;1.21.10-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053881" version="1" comment="golang-misc is &lt;1.21.10-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053882" version="1" comment="golang-src is &lt;1.21.10-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053883" version="1" comment="golang-tests is &lt;1.21.10-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030742" version="1" comment="bpftool is &lt;7.3.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030743" version="1" comment="kernel is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030744" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.22.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030745" version="1" comment="kernel-core is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030746" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030747" version="1" comment="kernel-debug is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030748" version="1" comment="kernel-debug-core is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030751" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030752" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030753" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030754" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030757" version="1" comment="kernel-doc is &lt;5.14.0-427.22.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030758" version="1" comment="kernel-headers is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030759" version="1" comment="kernel-modules is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030760" version="1" comment="kernel-modules-core is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030761" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030762" version="1" comment="kernel-tools is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030763" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030765" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030766" version="1" comment="libperf is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030767" version="1" comment="perf is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030768" version="1" comment="python3-perf is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030769" version="1" comment="rtla is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030770" version="1" comment="rv is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053884" version="1" comment="ca-certificates is &lt;2024.2.69_v8.0.303-91.4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053885" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053886" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053887" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053888" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053889" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053890" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053891" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053892" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.112-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053893" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.112-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053894" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.112-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053895" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053896" version="1" comment="dotnet-templates-8.0 is &lt;8.0.112-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053897" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053898" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053899" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053900" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053901" version="1" comment="dotnet-host is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053902" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053903" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053904" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053905" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.102-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053906" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.102-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053907" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.102-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053908" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.102-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053909" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053910" version="1" comment="dotnet-templates-9.0 is &lt;9.0.102-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053911" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.102-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053912" version="1" comment="iwl100-firmware is &lt;39.31.5.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053913" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053914" version="1" comment="iwl105-firmware is &lt;18.168.6.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053915" version="1" comment="iwl135-firmware is &lt;18.168.6.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053916" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053917" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053918" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053919" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053920" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053921" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053922" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053923" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053924" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053925" version="1" comment="libertas-sd8787-firmware is &lt;20250716-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053926" version="1" comment="linux-firmware is &lt;20250716-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053927" version="1" comment="linux-firmware-whence is &lt;20250716-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053928" version="1" comment="netronome-firmware is &lt;20250716-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053929" version="1" comment="iwl100-firmware is &lt;39.31.5.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053930" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053931" version="1" comment="iwl105-firmware is &lt;18.168.6.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053932" version="1" comment="iwl135-firmware is &lt;18.168.6.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053933" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053934" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053935" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053936" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053937" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053938" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053939" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053940" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053941" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053942" version="1" comment="libertas-sd8787-firmware is &lt;20250812-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053943" version="1" comment="linux-firmware is &lt;20250812-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053944" version="1" comment="linux-firmware-whence is &lt;20250812-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053945" version="1" comment="netronome-firmware is &lt;20250812-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053946" version="1" comment="open-vm-tools is &lt;13.0.0-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053947" version="1" comment="open-vm-tools-desktop is &lt;13.0.0-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053948" version="1" comment="open-vm-tools-salt-minion is &lt;13.0.0-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053949" version="1" comment="open-vm-tools-sdmp is &lt;13.0.0-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053950" version="1" comment="open-vm-tools-test is &lt;13.0.0-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053951" version="1" comment="mod_proxy_cluster is &lt;1.3.22-1.el9_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053952" version="1" comment="microcode_ctl is &lt;20240910-1.20250211.1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053953" version="1" comment="microcode_ctl is &lt;20250211-1.20250512.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053954" version="1" comment="nginx is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053955" version="1" comment="nginx-all-modules is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053956" version="1" comment="nginx-core is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053957" version="1" comment="nginx-filesystem is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053958" version="1" comment="nginx-mod-devel is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053959" version="1" comment="nginx-mod-http-image-filter is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053960" version="1" comment="nginx-mod-http-perl is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053961" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053962" version="1" comment="nginx-mod-mail is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053963" version="1" comment="nginx-mod-stream is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053964" version="1" comment="microcode_ctl is &lt;20230808-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053965" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053966" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053967" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053968" version="1" comment="dotnet-host is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053969" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053970" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053971" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.100~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053972" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.100~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053973" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053974" version="1" comment="dotnet-templates-8.0 is &lt;8.0.100~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053975" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.100~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053976" version="1" comment="redis is &lt;7.0.12-2.module+el9.3.0+21263+4e58afe8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053977" version="1" comment="redis-devel is &lt;7.0.12-2.module+el9.3.0+21263+4e58afe8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053978" version="1" comment="redis-doc is &lt;7.0.12-2.module+el9.3.0+21263+4e58afe8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053979" version="1" comment="microcode_ctl is &lt;20230808-2.20240531.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804134" version="1" comment="java-11-openjdk is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804135" version="1" comment="java-11-openjdk-demo is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804136" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804137" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804138" version="1" comment="java-11-openjdk-devel is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804139" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804140" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804141" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804142" version="1" comment="java-11-openjdk-headless is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804143" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804144" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804145" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804146" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804147" version="1" comment="java-11-openjdk-jmods is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804148" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804149" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804150" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804151" version="1" comment="java-11-openjdk-src is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804152" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804153" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804154" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804155" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804156" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804157" version="1" comment="java-17-openjdk is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804158" version="1" comment="java-17-openjdk-demo is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804159" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804160" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804161" version="1" comment="java-17-openjdk-devel is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804162" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804163" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804164" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804165" version="1" comment="java-17-openjdk-headless is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804166" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804167" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804168" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804169" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804170" version="1" comment="java-17-openjdk-jmods is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804171" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804172" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804173" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804174" version="1" comment="java-17-openjdk-src is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804175" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804176" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804177" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804178" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804179" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804180" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804181" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804182" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804183" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804184" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804185" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804186" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804187" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804188" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804189" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804190" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804191" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.332.b09-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804192" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.332.b09-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804193" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804194" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804195" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804196" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804197" version="1" comment="gzip is &lt;1.10-9.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804198" version="1" comment="zlib is &lt;1.2.11-31.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804199" version="1" comment="zlib-devel is &lt;1.2.11-31.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804200" version="1" comment="zlib-static is &lt;1.2.11-31.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804201" version="1" comment="pcs is &lt;0.11.1-10.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804202" version="1" comment="pcs-snmp is &lt;0.11.1-10.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804203" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804204" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804205" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804206" version="1" comment="dotnet-host is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804207" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804208" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804209" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.105-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804210" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.105-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804211" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804212" version="1" comment="dotnet-templates-6.0 is &lt;6.0.105-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804213" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.105-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804214" version="1" comment="thunderbird is &lt;91.9.0-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804215" version="1" comment="firefox is &lt;91.9.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804216" version="1" comment="mod_dav_svn is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804217" version="1" comment="python3-subversion is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804218" version="1" comment="subversion is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804219" version="1" comment="subversion-devel is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804220" version="1" comment="subversion-gnome is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804221" version="1" comment="subversion-libs is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804222" version="1" comment="subversion-perl is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804223" version="1" comment="subversion-tools is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804224" version="1" comment="rsync is &lt;3.2.3-9.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804225" version="1" comment="rsync-daemon is &lt;3.2.3-9.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804226" version="1" comment="firefox is &lt;91.9.1-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804227" version="1" comment="postgresql is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804228" version="1" comment="postgresql-contrib is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804229" version="1" comment="postgresql-plperl is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804230" version="1" comment="postgresql-plpython3 is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804231" version="1" comment="postgresql-pltcl is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804232" version="1" comment="postgresql-private-devel is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804233" version="1" comment="postgresql-private-libs is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804234" version="1" comment="postgresql-server is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804235" version="1" comment="postgresql-server-devel is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804236" version="1" comment="postgresql-test is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804237" version="1" comment="postgresql-upgrade is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804238" version="1" comment="thunderbird is &lt;91.9.1-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804239" version="1" comment="rsyslog is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804240" version="1" comment="rsyslog-crypto is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804241" version="1" comment="rsyslog-doc is &lt;8.2102.0-101.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804242" version="1" comment="rsyslog-elasticsearch is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804243" version="1" comment="rsyslog-gnutls is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804244" version="1" comment="rsyslog-gssapi is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804245" version="1" comment="rsyslog-kafka is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804246" version="1" comment="rsyslog-logrotate is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804247" version="1" comment="rsyslog-mmaudit is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804248" version="1" comment="rsyslog-mmfields is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804249" version="1" comment="rsyslog-mmjsonparse is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804250" version="1" comment="rsyslog-mmkubernetes is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804251" version="1" comment="rsyslog-mmnormalize is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804252" version="1" comment="rsyslog-mmsnmptrapd is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804253" version="1" comment="rsyslog-mysql is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804254" version="1" comment="rsyslog-omamqp1 is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804255" version="1" comment="rsyslog-openssl is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804256" version="1" comment="rsyslog-pgsql is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804257" version="1" comment="rsyslog-relp is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804258" version="1" comment="rsyslog-snmp is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804259" version="1" comment="rsyslog-udpspoof is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804260" version="1" comment="firefox is &lt;91.10.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804261" version="1" comment="thunderbird is &lt;91.10.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804262" version="1" comment="compat-openssl11 is &lt;1.1.1k-4.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804263" version="1" comment="xz is &lt;5.2.5-8.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804264" version="1" comment="xz-devel is &lt;5.2.5-8.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804265" version="1" comment="xz-libs is &lt;5.2.5-8.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804266" version="1" comment="xz-lzma-compat is &lt;5.2.5-8.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804267" version="1" comment="cups is &lt;2.3.3op2-13.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804268" version="1" comment="cups-client is &lt;2.3.3op2-13.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804269" version="1" comment="cups-devel is &lt;2.3.3op2-13.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804270" version="1" comment="cups-filesystem is &lt;2.3.3op2-13.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804271" version="1" comment="cups-ipptool is &lt;2.3.3op2-13.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804272" version="1" comment="cups-libs is &lt;2.3.3op2-13.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804273" version="1" comment="cups-lpd is &lt;2.3.3op2-13.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804274" version="1" comment="cups-printerapp is &lt;2.3.3op2-13.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804275" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804276" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804277" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804278" version="1" comment="dotnet-host is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804279" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804280" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804281" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.106-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804282" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804283" version="1" comment="dotnet-templates-6.0 is &lt;6.0.106-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804284" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.106-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804285" version="1" comment="vim-X11 is &lt;8.2.2637-16.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804286" version="1" comment="vim-common is &lt;8.2.2637-16.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804287" version="1" comment="vim-enhanced is &lt;8.2.2637-16.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804288" version="1" comment="vim-filesystem is &lt;8.2.2637-16.el9_0.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804289" version="1" comment="vim-minimal is &lt;8.2.2637-16.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804290" version="1" comment="expat is &lt;2.2.10-12.el9_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804291" version="1" comment="expat-devel is &lt;2.2.10-12.el9_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804292" version="1" comment="curl is &lt;7.76.1-14.el9_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804293" version="1" comment="curl-minimal is &lt;7.76.1-14.el9_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804294" version="1" comment="libcurl is &lt;7.76.1-14.el9_0.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804295" version="1" comment="libcurl-devel is &lt;7.76.1-14.el9_0.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804296" version="1" comment="libcurl-minimal is &lt;7.76.1-14.el9_0.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804297" version="1" comment="bpftool is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804298" version="1" comment="kernel is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804299" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-70.17.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804300" version="1" comment="kernel-core is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804301" version="1" comment="kernel-cross-headers is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804302" version="1" comment="kernel-debug is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804303" version="1" comment="kernel-debug-core is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804306" version="1" comment="kernel-debug-modules is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804307" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804310" version="1" comment="kernel-doc is &lt;5.14.0-70.17.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804311" version="1" comment="kernel-headers is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804312" version="1" comment="kernel-modules is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804313" version="1" comment="kernel-modules-extra is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804314" version="1" comment="kernel-tools is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804315" version="1" comment="kernel-tools-libs is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804317" version="1" comment="perf is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804318" version="1" comment="python3-perf is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804319" version="1" comment="libxml2 is &lt;2.9.13-1.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804320" version="1" comment="libxml2-devel is &lt;2.9.13-1.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804321" version="1" comment="python3-libxml2 is &lt;2.9.13-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804322" version="1" comment="pcre2 is &lt;10.37-5.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804323" version="1" comment="pcre2-devel is &lt;10.37-5.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804324" version="1" comment="pcre2-syntax is &lt;10.37-5.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804325" version="1" comment="pcre2-utf16 is &lt;10.37-5.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804326" version="1" comment="pcre2-utf32 is &lt;10.37-5.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804327" version="1" comment="bsdtar is &lt;3.5.3-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804328" version="1" comment="libarchive is &lt;3.5.3-2.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804329" version="1" comment="libarchive-devel is &lt;3.5.3-2.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804330" version="1" comment="libinput is &lt;1.19.3-2.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804331" version="1" comment="libinput-devel is &lt;1.19.3-2.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804332" version="1" comment="libinput-utils is &lt;1.19.3-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982264" version="1" comment="qemu-guest-agent is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982265" version="1" comment="qemu-img is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982266" version="1" comment="qemu-kvm is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982267" version="1" comment="qemu-kvm-audio-pa is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982268" version="1" comment="qemu-kvm-block-curl is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982269" version="1" comment="qemu-kvm-block-rbd is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982270" version="1" comment="qemu-kvm-common is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982271" version="1" comment="qemu-kvm-core is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982272" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982273" version="1" comment="qemu-kvm-device-display-virtio-gpu-gl is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982274" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982275" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci-gl is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982276" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982277" version="1" comment="qemu-kvm-device-display-virtio-vga-gl is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982278" version="1" comment="qemu-kvm-device-usb-host is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982279" version="1" comment="qemu-kvm-device-usb-redirect is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982280" version="1" comment="qemu-kvm-docs is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982281" version="1" comment="qemu-kvm-tools is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982282" version="1" comment="qemu-kvm-ui-egl-headless is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982283" version="1" comment="qemu-kvm-ui-opengl is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982284" version="1" comment="qemu-pr-helper is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804333" version="1" comment="firefox is &lt;91.11.0-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804334" version="1" comment="thunderbird is &lt;91.11.0-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804335" version="1" comment="squid is &lt;5.2-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804336" version="1" comment="java-11-openjdk is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804337" version="1" comment="java-11-openjdk-demo is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804338" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804339" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804340" version="1" comment="java-11-openjdk-devel is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804341" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804342" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804343" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804344" version="1" comment="java-11-openjdk-headless is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804345" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804346" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804347" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804348" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804349" version="1" comment="java-11-openjdk-jmods is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804350" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804351" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804352" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804353" version="1" comment="java-11-openjdk-src is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804354" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804355" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804356" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804357" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804358" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804359" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804360" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804361" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804362" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804363" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804364" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804365" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804366" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804367" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804368" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804369" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804370" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.342.b07-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804371" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.342.b07-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804372" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804373" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804374" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804375" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804376" version="1" comment="grafana is &lt;7.5.11-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804377" version="1" comment="java-17-openjdk is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804378" version="1" comment="java-17-openjdk-demo is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804379" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804380" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804381" version="1" comment="java-17-openjdk-devel is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804382" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804383" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804384" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804385" version="1" comment="java-17-openjdk-headless is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804386" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804387" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804388" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804389" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804390" version="1" comment="java-17-openjdk-jmods is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804391" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804392" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804393" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804394" version="1" comment="java-17-openjdk-src is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804395" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804396" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804397" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804398" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804399" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804400" version="1" comment="firefox is &lt;91.12.0-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804401" version="1" comment="thunderbird is &lt;91.12.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804402" version="1" comment="go-toolset is &lt;1.17.12-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804403" version="1" comment="golang is &lt;1.17.12-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804404" version="1" comment="golang-bin is &lt;1.17.12-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804405" version="1" comment="golang-docs is &lt;1.17.12-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804406" version="1" comment="golang-misc is &lt;1.17.12-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804407" version="1" comment="golang-race is &lt;1.17.12-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804408" version="1" comment="golang-src is &lt;1.17.12-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804409" version="1" comment="golang-tests is &lt;1.17.12-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804410" version="1" comment="php is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804411" version="1" comment="php-bcmath is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804412" version="1" comment="php-cli is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804413" version="1" comment="php-common is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804414" version="1" comment="php-dba is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804415" version="1" comment="php-dbg is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804416" version="1" comment="php-devel is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804417" version="1" comment="php-embedded is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804418" version="1" comment="php-enchant is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804419" version="1" comment="php-ffi is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804420" version="1" comment="php-fpm is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804421" version="1" comment="php-gd is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804422" version="1" comment="php-gmp is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804423" version="1" comment="php-intl is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804424" version="1" comment="php-ldap is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804425" version="1" comment="php-mbstring is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804426" version="1" comment="php-mysqlnd is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804427" version="1" comment="php-odbc is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804428" version="1" comment="php-opcache is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804429" version="1" comment="php-pdo is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804430" version="1" comment="php-pgsql is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804431" version="1" comment="php-process is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804432" version="1" comment="php-snmp is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804433" version="1" comment="php-soap is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804434" version="1" comment="php-xml is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804435" version="1" comment="vim-X11 is &lt;8.2.2637-16.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804436" version="1" comment="vim-common is &lt;8.2.2637-16.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804437" version="1" comment="vim-enhanced is &lt;8.2.2637-16.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804438" version="1" comment="vim-filesystem is &lt;8.2.2637-16.el9_0.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804439" version="1" comment="vim-minimal is &lt;8.2.2637-16.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804440" version="1" comment="galera is &lt;26.4.11-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804441" version="1" comment="mariadb is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804442" version="1" comment="mariadb-backup is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804443" version="1" comment="mariadb-common is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804444" version="1" comment="mariadb-devel is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804445" version="1" comment="mariadb-embedded is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804446" version="1" comment="mariadb-embedded-devel is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804447" version="1" comment="mariadb-errmsg is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804448" version="1" comment="mariadb-gssapi-server is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804449" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804450" version="1" comment="mariadb-pam is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804451" version="1" comment="mariadb-server is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804452" version="1" comment="mariadb-server-galera is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804453" version="1" comment="mariadb-server-utils is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804454" version="1" comment="mariadb-test is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804455" version="1" comment="mysql-selinux is &lt;1.0.5-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804456" version="1" comment="bpftool is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804457" version="1" comment="kernel is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804458" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-70.22.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804459" version="1" comment="kernel-core is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804460" version="1" comment="kernel-cross-headers is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804461" version="1" comment="kernel-debug is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804462" version="1" comment="kernel-debug-core is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804465" version="1" comment="kernel-debug-modules is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804466" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804469" version="1" comment="kernel-doc is &lt;5.14.0-70.22.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804470" version="1" comment="kernel-headers is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804471" version="1" comment="kernel-modules is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804472" version="1" comment="kernel-modules-extra is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804473" version="1" comment="kernel-tools is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804474" version="1" comment="kernel-tools-libs is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804476" version="1" comment="perf is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804477" version="1" comment="python3-perf is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804478" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804479" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804480" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804481" version="1" comment="dotnet-host is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804482" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804483" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804484" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.108-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804485" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.108-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804486" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804487" version="1" comment="dotnet-templates-6.0 is &lt;6.0.108-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804488" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.108-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804489" version="1" comment="curl is &lt;7.76.1-14.el9_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804490" version="1" comment="curl-minimal is &lt;7.76.1-14.el9_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804491" version="1" comment="libcurl is &lt;7.76.1-14.el9_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804492" version="1" comment="libcurl-devel is &lt;7.76.1-14.el9_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804493" version="1" comment="libcurl-minimal is &lt;7.76.1-14.el9_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804494" version="1" comment="thunderbird is &lt;91.13.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804495" version="1" comment="firefox is &lt;91.13.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804496" version="1" comment="rsync is &lt;3.2.3-9.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804497" version="1" comment="rsync-daemon is &lt;3.2.3-9.el9_0.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804498" version="1" comment="openssl is &lt;3.0.1-41.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804499" version="1" comment="openssl-devel is &lt;3.0.1-41.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804500" version="1" comment="openssl-libs is &lt;3.0.1-41.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804501" version="1" comment="openssl-perl is &lt;3.0.1-41.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804502" version="1" comment="pcs is &lt;0.11.1-10.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804503" version="1" comment="pcs-snmp is &lt;0.11.1-10.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804504" version="1" comment="open-vm-tools is &lt;11.3.5-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804505" version="1" comment="open-vm-tools-desktop is &lt;11.3.5-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804506" version="1" comment="open-vm-tools-sdmp is &lt;11.3.5-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804507" version="1" comment="open-vm-tools-test is &lt;11.3.5-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804508" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804509" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804510" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804511" version="1" comment="dotnet-host is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804512" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804513" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804514" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.109-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804515" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.109-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804516" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804517" version="1" comment="dotnet-templates-6.0 is &lt;6.0.109-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804518" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.109-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804519" version="1" comment="booth is &lt;1.0-251.3.bfb2f92.git.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804520" version="1" comment="booth-arbitrator is &lt;1.0-251.3.bfb2f92.git.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804521" version="1" comment="booth-core is &lt;1.0-251.3.bfb2f92.git.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804522" version="1" comment="booth-site is &lt;1.0-251.3.bfb2f92.git.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804523" version="1" comment="booth-test is &lt;1.0-251.3.bfb2f92.git.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804524" version="1" comment="ruby is &lt;3.0.4-160.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804525" version="1" comment="ruby-default-gems is &lt;3.0.4-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804526" version="1" comment="ruby-devel is &lt;3.0.4-160.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804527" version="1" comment="ruby-doc is &lt;3.0.4-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804528" version="1" comment="ruby-libs is &lt;3.0.4-160.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804529" version="1" comment="rubygem-bigdecimal is &lt;3.0.0-160.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804530" version="1" comment="rubygem-bundler is &lt;2.2.33-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804531" version="1" comment="rubygem-io-console is &lt;0.5.7-160.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804532" version="1" comment="rubygem-irb is &lt;1.3.5-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804533" version="1" comment="rubygem-json is &lt;2.5.1-160.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804534" version="1" comment="rubygem-minitest is &lt;5.14.2-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804535" version="1" comment="rubygem-power_assert is &lt;1.2.0-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804536" version="1" comment="rubygem-psych is &lt;3.3.2-160.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804537" version="1" comment="rubygem-rake is &lt;13.0.3-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804538" version="1" comment="rubygem-rbs is &lt;1.4.0-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804539" version="1" comment="rubygem-rdoc is &lt;6.3.3-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804540" version="1" comment="rubygem-rexml is &lt;3.2.5-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804541" version="1" comment="rubygem-rss is &lt;0.2.9-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804542" version="1" comment="rubygem-test-unit is &lt;3.3.7-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804543" version="1" comment="rubygem-typeprof is &lt;0.15.2-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804544" version="1" comment="rubygems is &lt;3.2.33-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804545" version="1" comment="rubygems-devel is &lt;3.2.33-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804546" version="1" comment="mysql is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804547" version="1" comment="mysql-common is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804548" version="1" comment="mysql-devel is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804549" version="1" comment="mysql-errmsg is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804550" version="1" comment="mysql-libs is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804551" version="1" comment="mysql-server is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804552" version="1" comment="mysql-test is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804553" version="1" comment="nodejs is &lt;16.16.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804554" version="1" comment="nodejs-docs is &lt;16.16.0-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804555" version="1" comment="nodejs-full-i18n is &lt;16.16.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804556" version="1" comment="nodejs-libs is &lt;16.16.0-1.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804557" version="1" comment="nodejs-nodemon is &lt;2.0.19-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804558" version="1" comment="npm is &lt;8.11.0-1.16.16.0.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804559" version="1" comment="gnupg2 is &lt;2.3.3-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804560" version="1" comment="gnupg2-smime is &lt;2.3.3-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804561" version="1" comment="dbus-broker is &lt;28-5.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804562" version="1" comment="bpftool is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804563" version="1" comment="kernel is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804564" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-70.26.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804565" version="1" comment="kernel-core is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804566" version="1" comment="kernel-cross-headers is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804567" version="1" comment="kernel-debug is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804568" version="1" comment="kernel-debug-core is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804571" version="1" comment="kernel-debug-modules is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804572" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804575" version="1" comment="kernel-doc is &lt;5.14.0-70.26.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804576" version="1" comment="kernel-headers is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804577" version="1" comment="kernel-modules is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804578" version="1" comment="kernel-modules-extra is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804579" version="1" comment="kernel-tools is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804580" version="1" comment="kernel-tools-libs is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804582" version="1" comment="perf is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804583" version="1" comment="python3-perf is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804584" version="1" comment="webkit2gtk3 is &lt;2.36.7-1.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804585" version="1" comment="webkit2gtk3-devel is &lt;2.36.7-1.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804586" version="1" comment="webkit2gtk3-jsc is &lt;2.36.7-1.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804587" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.36.7-1.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804588" version="1" comment="firefox is &lt;102.3.0-6.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804589" version="1" comment="thunderbird is &lt;102.3.0-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804590" version="1" comment="bind is &lt;9.16.23-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804591" version="1" comment="bind-chroot is &lt;9.16.23-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804592" version="1" comment="bind-devel is &lt;9.16.23-1.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804593" version="1" comment="bind-dnssec-doc is &lt;9.16.23-1.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804594" version="1" comment="bind-dnssec-utils is &lt;9.16.23-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804595" version="1" comment="bind-libs is &lt;9.16.23-1.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804596" version="1" comment="bind-license is &lt;9.16.23-1.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804597" version="1" comment="bind-utils is &lt;9.16.23-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804598" version="1" comment="python3-bind is &lt;9.16.23-1.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804599" version="1" comment="expat is &lt;2.2.10-12.el9_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804600" version="1" comment="expat-devel is &lt;2.2.10-12.el9_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804601" version="1" comment="squid is &lt;5.2-1.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804602" version="1" comment="gnutls is &lt;3.7.6-12.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804603" version="1" comment="gnutls-c++ is &lt;3.7.6-12.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804604" version="1" comment="gnutls-dane is &lt;3.7.6-12.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804605" version="1" comment="gnutls-devel is &lt;3.7.6-12.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804606" version="1" comment="gnutls-utils is &lt;3.7.6-12.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804607" version="1" comment="nettle is &lt;3.8-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804608" version="1" comment="nettle-devel is &lt;3.8-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804609" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804610" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804611" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804612" version="1" comment="dotnet-host is &lt;6.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804613" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804614" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804615" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.110-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804616" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.110-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804617" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804618" version="1" comment="dotnet-templates-6.0 is &lt;6.0.110-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804619" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.110-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804620" version="1" comment="nodejs is &lt;16.17.1-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804621" version="1" comment="nodejs-docs is &lt;16.17.1-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804622" version="1" comment="nodejs-full-i18n is &lt;16.17.1-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804623" version="1" comment="nodejs-libs is &lt;16.17.1-1.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804624" version="1" comment="npm is &lt;8.15.0-1.16.17.1.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804625" version="1" comment="java-17-openjdk is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804626" version="1" comment="java-17-openjdk-demo is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804627" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804628" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804629" version="1" comment="java-17-openjdk-devel is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804630" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804631" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804632" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804633" version="1" comment="java-17-openjdk-headless is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804634" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804635" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804636" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804637" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804638" version="1" comment="java-17-openjdk-jmods is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804639" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804640" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804641" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804642" version="1" comment="java-17-openjdk-src is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804643" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804644" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804645" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804646" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804647" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804648" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804649" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804650" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804651" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804652" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804653" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804654" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804655" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804656" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804657" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804658" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804659" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.352.b08-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804660" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.352.b08-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804661" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804662" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804663" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804664" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804665" version="1" comment="java-11-openjdk is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804666" version="1" comment="java-11-openjdk-demo is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804667" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804668" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804669" version="1" comment="java-11-openjdk-devel is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804670" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804671" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804672" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804673" version="1" comment="java-11-openjdk-headless is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804674" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804675" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804676" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804677" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804678" version="1" comment="java-11-openjdk-jmods is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804679" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804680" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804681" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804682" version="1" comment="java-11-openjdk-src is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804683" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804684" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804685" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804686" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804687" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804688" version="1" comment="firefox is &lt;102.3.0-7.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804689" version="1" comment="thunderbird is &lt;102.3.0-4.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804690" version="1" comment="firefox is &lt;102.4.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804691" version="1" comment="libksba is &lt;1.5.1-5.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804692" version="1" comment="libksba-devel is &lt;1.5.1-5.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804693" version="1" comment="thunderbird is &lt;102.4.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804694" version="1" comment="device-mapper-multipath is &lt;0.8.7-7.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804695" version="1" comment="device-mapper-multipath-devel is &lt;0.8.7-7.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804696" version="1" comment="device-mapper-multipath-libs is &lt;0.8.7-7.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804697" version="1" comment="kpartx is &lt;0.8.7-7.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804698" version="1" comment="openssl is &lt;3.0.1-43.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804699" version="1" comment="openssl-devel is &lt;3.0.1-43.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804700" version="1" comment="openssl-libs is &lt;3.0.1-43.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804701" version="1" comment="openssl-perl is &lt;3.0.1-43.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804702" version="1" comment="zlib is &lt;1.2.11-32.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804703" version="1" comment="zlib-devel is &lt;1.2.11-32.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804704" version="1" comment="zlib-static is &lt;1.2.11-32.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804705" version="1" comment="bpftool is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804706" version="1" comment="kernel is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804707" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-70.30.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804708" version="1" comment="kernel-core is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804709" version="1" comment="kernel-cross-headers is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804710" version="1" comment="kernel-debug is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804711" version="1" comment="kernel-debug-core is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804714" version="1" comment="kernel-debug-modules is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804715" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804718" version="1" comment="kernel-doc is &lt;5.14.0-70.30.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804719" version="1" comment="kernel-headers is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804720" version="1" comment="kernel-modules is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804721" version="1" comment="kernel-modules-extra is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804722" version="1" comment="kernel-tools is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804723" version="1" comment="kernel-tools-libs is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804725" version="1" comment="perf is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804726" version="1" comment="python3-perf is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804727" version="1" comment="python-unversioned-command is &lt;3.9.10-3.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804728" version="1" comment="python3 is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804729" version="1" comment="python3-debug is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804730" version="1" comment="python3-devel is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804731" version="1" comment="python3-idle is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804732" version="1" comment="python3-libs is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804733" version="1" comment="python3-test is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804734" version="1" comment="python3-tkinter is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804735" version="1" comment="pki-acme is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804736" version="1" comment="pki-base is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804737" version="1" comment="pki-base-java is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804738" version="1" comment="pki-ca is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804739" version="1" comment="pki-kra is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804740" version="1" comment="pki-server is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804741" version="1" comment="pki-symkey is &lt;11.0.6-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804742" version="1" comment="pki-tools is &lt;11.0.6-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804743" version="1" comment="python3-pki is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804744" version="1" comment="lua is &lt;5.4.2-4.el9_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804745" version="1" comment="lua-devel is &lt;5.4.2-4.el9_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804746" version="1" comment="lua-libs is &lt;5.4.2-4.el9_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804747" version="1" comment="pcs is &lt;0.11.3-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804748" version="1" comment="pcs-snmp is &lt;0.11.3-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804749" version="1" comment="podman is &lt;4.2.0-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804750" version="1" comment="podman-docker is &lt;4.2.0-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804751" version="1" comment="podman-gvproxy is &lt;4.2.0-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804752" version="1" comment="podman-plugins is &lt;4.2.0-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804753" version="1" comment="podman-remote is &lt;4.2.0-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804754" version="1" comment="podman-tests is &lt;4.2.0-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804755" version="1" comment="skopeo is &lt;1.9.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804756" version="1" comment="skopeo-tests is &lt;1.9.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804757" version="1" comment="libguestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804758" version="1" comment="libguestfs-appliance is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804759" version="1" comment="libguestfs-bash-completion is &lt;1.48.4-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804760" version="1" comment="libguestfs-devel is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804761" version="1" comment="libguestfs-gobject is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804762" version="1" comment="libguestfs-gobject-devel is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804763" version="1" comment="libguestfs-inspect-icons is &lt;1.48.4-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804764" version="1" comment="libguestfs-man-pages-ja is &lt;1.48.4-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804765" version="1" comment="libguestfs-man-pages-uk is &lt;1.48.4-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804766" version="1" comment="libguestfs-rescue is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804767" version="1" comment="libguestfs-rsync is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804768" version="1" comment="libguestfs-xfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804769" version="1" comment="lua-guestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804770" version="1" comment="ocaml-libguestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804771" version="1" comment="ocaml-libguestfs-devel is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804772" version="1" comment="perl-Sys-Guestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804773" version="1" comment="php-libguestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804774" version="1" comment="python3-libguestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804775" version="1" comment="ruby-libguestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804776" version="1" comment="guestfs-tools is &lt;1.48.2-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804777" version="1" comment="virt-win-reg is &lt;1.48.2-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804778" version="1" comment="qemu-guest-agent is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804779" version="1" comment="qemu-img is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804780" version="1" comment="qemu-kvm is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804781" version="1" comment="qemu-kvm-audio-pa is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804782" version="1" comment="qemu-kvm-block-curl is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804783" version="1" comment="qemu-kvm-block-rbd is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804784" version="1" comment="qemu-kvm-common is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804785" version="1" comment="qemu-kvm-core is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804786" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804787" version="1" comment="qemu-kvm-device-display-virtio-gpu-gl is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804788" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804789" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci-gl is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804790" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804791" version="1" comment="qemu-kvm-device-display-virtio-vga-gl is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804792" version="1" comment="qemu-kvm-device-usb-host is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804793" version="1" comment="qemu-kvm-device-usb-redirect is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804794" version="1" comment="qemu-kvm-docs is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804795" version="1" comment="qemu-kvm-tools is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804796" version="1" comment="qemu-kvm-ui-egl-headless is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804797" version="1" comment="qemu-kvm-ui-opengl is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804798" version="1" comment="qemu-pr-helper is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804799" version="1" comment="virt-v2v is &lt;2.0.7-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804800" version="1" comment="virt-v2v-bash-completion is &lt;2.0.7-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804801" version="1" comment="virt-v2v-man-pages-ja is &lt;2.0.7-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804802" version="1" comment="virt-v2v-man-pages-uk is &lt;2.0.7-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804803" version="1" comment="protobuf is &lt;3.14.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804804" version="1" comment="protobuf-compiler is &lt;3.14.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804805" version="1" comment="protobuf-devel is &lt;3.14.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804806" version="1" comment="protobuf-lite is &lt;3.14.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804807" version="1" comment="protobuf-lite-devel is &lt;3.14.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804808" version="1" comment="python3-protobuf is &lt;3.14.0-13.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804809" version="1" comment="gimp is &lt;2.99.8-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804810" version="1" comment="gimp-libs is &lt;2.99.8-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804811" version="1" comment="speex is &lt;1.2.0-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804812" version="1" comment="speex-devel is &lt;1.2.0-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804813" version="1" comment="libvirt is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804814" version="1" comment="libvirt-client is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804815" version="1" comment="libvirt-daemon is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804816" version="1" comment="libvirt-daemon-config-network is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804817" version="1" comment="libvirt-daemon-config-nwfilter is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804818" version="1" comment="libvirt-daemon-driver-interface is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804819" version="1" comment="libvirt-daemon-driver-network is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804820" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804821" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804822" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804823" version="1" comment="libvirt-daemon-driver-secret is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804824" version="1" comment="libvirt-daemon-driver-storage is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804825" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804826" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804827" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804828" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804829" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804830" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804831" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804832" version="1" comment="libvirt-daemon-kvm is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804833" version="1" comment="libvirt-devel is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804834" version="1" comment="libvirt-docs is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804835" version="1" comment="libvirt-libs is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804836" version="1" comment="libvirt-lock-sanlock is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804837" version="1" comment="libvirt-nss is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804838" version="1" comment="buildah is &lt;1.27.0-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804839" version="1" comment="buildah-tests is &lt;1.27.0-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804840" version="1" comment="fribidi is &lt;1.0.10-6.el9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804841" version="1" comment="fribidi-devel is &lt;1.0.10-6.el9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804842" version="1" comment="qt5 is &lt;5.15.3-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804843" version="1" comment="qt5-devel is &lt;5.15.3-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804844" version="1" comment="qt5-rpm-macros is &lt;5.15.3-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804845" version="1" comment="qt5-srpm-macros is &lt;5.15.3-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804846" version="1" comment="webkit2gtk3 is &lt;2.36.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804847" version="1" comment="webkit2gtk3-devel is &lt;2.36.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804848" version="1" comment="webkit2gtk3-jsc is &lt;2.36.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804849" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.36.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804850" version="1" comment="grafana is &lt;7.5.15-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804851" version="1" comment="python3-unbound is &lt;1.16.2-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804852" version="1" comment="unbound is &lt;1.16.2-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804853" version="1" comment="unbound-devel is &lt;1.16.2-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804854" version="1" comment="unbound-libs is &lt;1.16.2-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804855" version="1" comment="httpd is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804856" version="1" comment="httpd-core is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804857" version="1" comment="httpd-devel is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804858" version="1" comment="httpd-filesystem is &lt;2.4.53-7.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804859" version="1" comment="httpd-manual is &lt;2.4.53-7.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804860" version="1" comment="httpd-tools is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804861" version="1" comment="mod_ldap is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804862" version="1" comment="mod_lua is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804863" version="1" comment="mod_proxy_html is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804864" version="1" comment="mod_session is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804865" version="1" comment="mod_ssl is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804866" version="1" comment="bind is &lt;9.16.23-5.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804867" version="1" comment="bind-chroot is &lt;9.16.23-5.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804868" version="1" comment="bind-devel is &lt;9.16.23-5.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804869" version="1" comment="bind-dnssec-doc is &lt;9.16.23-5.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804870" version="1" comment="bind-dnssec-utils is &lt;9.16.23-5.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804871" version="1" comment="bind-doc is &lt;9.16.23-5.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804872" version="1" comment="bind-libs is &lt;9.16.23-5.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804873" version="1" comment="bind-license is &lt;9.16.23-5.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804874" version="1" comment="bind-utils is &lt;9.16.23-5.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804875" version="1" comment="python3-bind is &lt;9.16.23-5.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804876" version="1" comment="dnsmasq is &lt;2.85-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804877" version="1" comment="dnsmasq-utils is &lt;2.85-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804878" version="1" comment="flac is &lt;1.3.3-10.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804879" version="1" comment="flac-devel is &lt;1.3.3-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804880" version="1" comment="flac-libs is &lt;1.3.3-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804881" version="1" comment="runc is &lt;1.1.4-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804882" version="1" comment="redis is &lt;6.2.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804883" version="1" comment="redis-devel is &lt;6.2.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804884" version="1" comment="redis-doc is &lt;6.2.7-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804885" version="1" comment="toolbox is &lt;0.0.99.3-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804886" version="1" comment="toolbox-tests is &lt;0.0.99.3-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804887" version="1" comment="swtpm is &lt;0.7.0-3.20211109gitb79fd91.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804888" version="1" comment="swtpm-libs is &lt;0.7.0-3.20211109gitb79fd91.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804889" version="1" comment="swtpm-tools is &lt;0.7.0-3.20211109gitb79fd91.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804890" version="1" comment="frr is &lt;8.2.2-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804891" version="1" comment="ignition is &lt;2.14.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804892" version="1" comment="wavpack is &lt;5.4.0-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804893" version="1" comment="wavpack-devel is &lt;5.4.0-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804894" version="1" comment="poppler is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804895" version="1" comment="poppler-cpp is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804896" version="1" comment="poppler-cpp-devel is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804897" version="1" comment="poppler-devel is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804898" version="1" comment="poppler-glib is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804899" version="1" comment="poppler-glib-devel is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804900" version="1" comment="poppler-qt5 is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804901" version="1" comment="poppler-qt5-devel is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804902" version="1" comment="poppler-utils is &lt;21.01.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804903" version="1" comment="389-ds-base is &lt;2.1.3-4.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804904" version="1" comment="389-ds-base-libs is &lt;2.1.3-4.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804905" version="1" comment="python3-lib389 is &lt;2.1.3-4.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804906" version="1" comment="libtiff is &lt;4.4.0-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804907" version="1" comment="libtiff-devel is &lt;4.4.0-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804908" version="1" comment="libtiff-tools is &lt;4.4.0-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804909" version="1" comment="php is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804910" version="1" comment="php-bcmath is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804911" version="1" comment="php-cli is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804912" version="1" comment="php-common is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804913" version="1" comment="php-dba is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804914" version="1" comment="php-dbg is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804915" version="1" comment="php-devel is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804916" version="1" comment="php-embedded is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804917" version="1" comment="php-enchant is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804918" version="1" comment="php-ffi is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804919" version="1" comment="php-fpm is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804920" version="1" comment="php-gd is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804921" version="1" comment="php-gmp is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804922" version="1" comment="php-intl is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804923" version="1" comment="php-ldap is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804924" version="1" comment="php-mbstring is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804925" version="1" comment="php-mysqlnd is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804926" version="1" comment="php-odbc is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804927" version="1" comment="php-opcache is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804928" version="1" comment="php-pdo is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804929" version="1" comment="php-pgsql is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804930" version="1" comment="php-process is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804931" version="1" comment="php-snmp is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804932" version="1" comment="php-soap is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804933" version="1" comment="php-xml is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804934" version="1" comment="openjpeg2 is &lt;2.4.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804935" version="1" comment="openjpeg2-devel is &lt;2.4.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804936" version="1" comment="openjpeg2-tools is &lt;2.4.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804937" version="1" comment="dovecot is &lt;2.3.16-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804938" version="1" comment="dovecot-devel is &lt;2.3.16-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804939" version="1" comment="dovecot-mysql is &lt;2.3.16-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804940" version="1" comment="dovecot-pgsql is &lt;2.3.16-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804941" version="1" comment="dovecot-pigeonhole is &lt;2.3.16-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804942" version="1" comment="mutt is &lt;2.2.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804943" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804944" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804945" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804946" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804947" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804948" version="1" comment="xorg-x11-server-common is &lt;1.20.11-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804949" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804950" version="1" comment="xorg-x11-server-source is &lt;1.20.11-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804951" version="1" comment="xorg-x11-server-Xwayland is &lt;21.1.3-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804952" version="1" comment="python3-lxml is &lt;4.6.5-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804953" version="1" comment="grafana-pcp is &lt;3.2.0-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804954" version="1" comment="yajl is &lt;2.1.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804955" version="1" comment="yajl-devel is &lt;2.1.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804956" version="1" comment="dpdk is &lt;21.11.2-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804957" version="1" comment="dpdk-devel is &lt;21.11.2-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804958" version="1" comment="dpdk-doc is &lt;21.11.2-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804959" version="1" comment="dpdk-tools is &lt;21.11.2-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804960" version="1" comment="bpftool is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804961" version="1" comment="kernel is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804962" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-162.6.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804963" version="1" comment="kernel-core is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804964" version="1" comment="kernel-cross-headers is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804965" version="1" comment="kernel-debug is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804966" version="1" comment="kernel-debug-core is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804969" version="1" comment="kernel-debug-modules is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804970" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804973" version="1" comment="kernel-doc is &lt;5.14.0-162.6.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804974" version="1" comment="kernel-headers is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804975" version="1" comment="kernel-modules is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804976" version="1" comment="kernel-modules-extra is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804977" version="1" comment="kernel-tools is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804978" version="1" comment="kernel-tools-libs is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804980" version="1" comment="perf is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804981" version="1" comment="python3-perf is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804982" version="1" comment="rsync is &lt;3.2.3-18.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804983" version="1" comment="rsync-daemon is &lt;3.2.3-18.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804984" version="1" comment="curl is &lt;7.76.1-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804985" version="1" comment="curl-minimal is &lt;7.76.1-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804986" version="1" comment="libcurl is &lt;7.76.1-19.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804987" version="1" comment="libcurl-devel is &lt;7.76.1-19.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804988" version="1" comment="libcurl-minimal is &lt;7.76.1-19.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804989" version="1" comment="ctdb is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804990" version="1" comment="libsmbclient is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804991" version="1" comment="libsmbclient-devel is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804992" version="1" comment="libwbclient is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804993" version="1" comment="libwbclient-devel is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804994" version="1" comment="python3-samba is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804995" version="1" comment="samba is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804996" version="1" comment="samba-client is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804997" version="1" comment="samba-client-libs is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804998" version="1" comment="samba-common is &lt;4.16.4-101.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804999" version="1" comment="samba-common-libs is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805000" version="1" comment="samba-common-tools is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805001" version="1" comment="samba-devel is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805002" version="1" comment="samba-krb5-printing is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805003" version="1" comment="samba-libs is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805004" version="1" comment="samba-pidl is &lt;4.16.4-101.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805005" version="1" comment="samba-test is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805006" version="1" comment="samba-test-libs is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805007" version="1" comment="samba-vfs-iouring is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805008" version="1" comment="samba-winbind is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805009" version="1" comment="samba-winbind-clients is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805010" version="1" comment="samba-winbind-krb5-locator is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805011" version="1" comment="samba-winbind-modules is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805012" version="1" comment="samba-winexe is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805013" version="1" comment="ldb-tools is &lt;2.5.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805014" version="1" comment="libldb is &lt;2.5.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805015" version="1" comment="libldb-devel is &lt;2.5.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805016" version="1" comment="python3-ldb is &lt;2.5.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805017" version="1" comment="freetype is &lt;2.10.4-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805018" version="1" comment="freetype-devel is &lt;2.10.4-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805019" version="1" comment="python-unversioned-command is &lt;3.9.14-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805020" version="1" comment="python3 is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805021" version="1" comment="python3-debug is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805022" version="1" comment="python3-devel is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805023" version="1" comment="python3-idle is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805024" version="1" comment="python3-libs is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805025" version="1" comment="python3-test is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805026" version="1" comment="python3-tkinter is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805027" version="1" comment="e2fsprogs is &lt;1.46.5-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805028" version="1" comment="e2fsprogs-devel is &lt;1.46.5-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805029" version="1" comment="e2fsprogs-libs is &lt;1.46.5-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805030" version="1" comment="libcom_err is &lt;1.46.5-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805031" version="1" comment="libcom_err-devel is &lt;1.46.5-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805032" version="1" comment="libss is &lt;1.46.5-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805033" version="1" comment="harfbuzz is &lt;2.7.4-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805034" version="1" comment="harfbuzz-devel is &lt;2.7.4-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805035" version="1" comment="harfbuzz-icu is &lt;2.7.4-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805036" version="1" comment="dhcp-client is &lt;4.4.2-17.b1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805037" version="1" comment="dhcp-common is &lt;4.4.2-17.b1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805038" version="1" comment="dhcp-relay is &lt;4.4.2-17.b1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805039" version="1" comment="dhcp-server is &lt;4.4.2-17.b1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805040" version="1" comment="logrotate is &lt;3.18.0-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805041" version="1" comment="libtirpc is &lt;1.3.3-0.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805042" version="1" comment="libtirpc-devel is &lt;1.3.3-0.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805043" version="1" comment="mingw32-cpp is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805044" version="1" comment="mingw32-gcc is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805045" version="1" comment="mingw32-gcc-c++ is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805046" version="1" comment="mingw32-libgcc is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805047" version="1" comment="mingw64-cpp is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805048" version="1" comment="mingw64-gcc is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805049" version="1" comment="mingw64-gcc-c++ is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805050" version="1" comment="mingw64-libgcc is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805051" version="1" comment="mingw32-glib2 is &lt;2.70.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805052" version="1" comment="mingw32-glib2-static is &lt;2.70.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805053" version="1" comment="mingw64-glib2 is &lt;2.70.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805054" version="1" comment="mingw64-glib2-static is &lt;2.70.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805055" version="1" comment="mingw32-zlib is &lt;1.2.12-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805056" version="1" comment="mingw32-zlib-static is &lt;1.2.12-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805057" version="1" comment="mingw64-zlib is &lt;1.2.12-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805058" version="1" comment="mingw64-zlib-static is &lt;1.2.12-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805059" version="1" comment="podman is &lt;4.2.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805060" version="1" comment="podman-catatonit is &lt;4.2.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805061" version="1" comment="podman-docker is &lt;4.2.0-7.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805062" version="1" comment="podman-gvproxy is &lt;4.2.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805063" version="1" comment="podman-plugins is &lt;4.2.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805064" version="1" comment="podman-remote is &lt;4.2.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805065" version="1" comment="podman-tests is &lt;4.2.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805066" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805067" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805068" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805069" version="1" comment="dotnet-host is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805070" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805071" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805072" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.100-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805073" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.100-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805074" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805075" version="1" comment="dotnet-templates-7.0 is &lt;7.0.100-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805076" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.100-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805077" version="1" comment="keylime is &lt;6.5.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805078" version="1" comment="keylime-base is &lt;6.5.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805079" version="1" comment="keylime-registrar is &lt;6.5.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805080" version="1" comment="keylime-selinux is &lt;6.5.1-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805081" version="1" comment="keylime-tenant is &lt;6.5.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805082" version="1" comment="keylime-verifier is &lt;6.5.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805083" version="1" comment="python3-keylime is &lt;6.5.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805084" version="1" comment="device-mapper-multipath is &lt;0.8.7-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805085" version="1" comment="device-mapper-multipath-devel is &lt;0.8.7-12.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805086" version="1" comment="device-mapper-multipath-libs is &lt;0.8.7-12.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805087" version="1" comment="kpartx is &lt;0.8.7-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805088" version="1" comment="python-unversioned-command is &lt;3.9.14-1.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805089" version="1" comment="python3 is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805090" version="1" comment="python3-debug is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805091" version="1" comment="python3-devel is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805092" version="1" comment="python3-idle is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805093" version="1" comment="python3-libs is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805094" version="1" comment="python3-test is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805095" version="1" comment="python3-tkinter is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805096" version="1" comment="thunderbird is &lt;102.5.0-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805097" version="1" comment="firefox is &lt;102.5.0-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805098" version="1" comment="krb5-devel is &lt;1.19.1-24.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805099" version="1" comment="krb5-libs is &lt;1.19.1-24.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805100" version="1" comment="krb5-pkinit is &lt;1.19.1-24.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805101" version="1" comment="krb5-server is &lt;1.19.1-24.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805102" version="1" comment="krb5-server-ldap is &lt;1.19.1-24.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805103" version="1" comment="krb5-workstation is &lt;1.19.1-24.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805104" version="1" comment="libkadm5 is &lt;1.19.1-24.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805105" version="1" comment="varnish is &lt;6.6.2-2.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805106" version="1" comment="varnish-devel is &lt;6.6.2-2.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805107" version="1" comment="varnish-docs is &lt;6.6.2-2.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805108" version="1" comment="nodejs is &lt;18.12.1-1.module+el9.1.0.z+17326+318294bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805109" version="1" comment="nodejs-devel is &lt;18.12.1-1.module+el9.1.0.z+17326+318294bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805110" version="1" comment="nodejs-docs is &lt;18.12.1-1.module+el9.1.0.z+17326+318294bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805111" version="1" comment="nodejs-full-i18n is &lt;18.12.1-1.module+el9.1.0.z+17326+318294bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805112" version="1" comment="nodejs-nodemon is &lt;2.0.20-1.module+el9.1.0.z+17326+318294bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805113" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.1.0+15718+e52ec601 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805114" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.1.0+15718+e52ec601 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805115" version="1" comment="npm is &lt;8.19.2-1.18.12.1.1.module+el9.1.0.z+17326+318294bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805116" version="1" comment="firefox is &lt;102.6.0-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805117" version="1" comment="thunderbird is &lt;102.6.0-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805118" version="1" comment="bcel is &lt;6.4.1-9.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805119" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.13-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805120" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.13-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805121" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.13-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805122" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.13-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805123" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.13-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805124" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.113-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805125" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.113-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805126" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.13-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805127" version="1" comment="dotnet-templates-6.0 is &lt;6.0.113-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805128" version="1" comment="java-17-openjdk is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805129" version="1" comment="java-17-openjdk-demo is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805130" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805131" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805132" version="1" comment="java-17-openjdk-devel is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805133" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805134" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805135" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805136" version="1" comment="java-17-openjdk-headless is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805137" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805138" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805139" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805140" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805141" version="1" comment="java-17-openjdk-jmods is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805142" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805143" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805144" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805145" version="1" comment="java-17-openjdk-src is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805146" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805147" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805148" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805149" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805150" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805151" version="1" comment="java-11-openjdk is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805152" version="1" comment="java-11-openjdk-demo is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805153" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805154" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805155" version="1" comment="java-11-openjdk-devel is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805156" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805157" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805158" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805159" version="1" comment="java-11-openjdk-headless is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805160" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805161" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805162" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805163" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805164" version="1" comment="java-11-openjdk-jmods is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805165" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805166" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805167" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805168" version="1" comment="java-11-openjdk-src is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805169" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805170" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805171" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805172" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805173" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805174" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805175" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805176" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805177" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805178" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805179" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805180" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805181" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805182" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805183" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805184" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805185" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.362.b09-2.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805186" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.362.b09-2.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805187" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805188" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805189" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805190" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805191" version="1" comment="sudo is &lt;1.9.5p2-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805192" version="1" comment="sudo-python-plugin is &lt;1.9.5p2-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805193" version="1" comment="firefox is &lt;102.7.0-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805194" version="1" comment="libtiff is &lt;4.4.0-5.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805195" version="1" comment="libtiff-devel is &lt;4.4.0-5.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805196" version="1" comment="libtiff-tools is &lt;4.4.0-5.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805197" version="1" comment="usbguard is &lt;1.0.0-10.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805198" version="1" comment="usbguard-dbus is &lt;1.0.0-10.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805199" version="1" comment="usbguard-notifier is &lt;1.0.0-10.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805200" version="1" comment="usbguard-selinux is &lt;1.0.0-10.el9_1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805201" version="1" comment="usbguard-tools is &lt;1.0.0-10.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805202" version="1" comment="postgresql-jdbc is &lt;42.2.18-6.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805203" version="1" comment="nodejs is &lt;16.18.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805204" version="1" comment="nodejs-docs is &lt;16.18.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805205" version="1" comment="nodejs-full-i18n is &lt;16.18.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805206" version="1" comment="nodejs-libs is &lt;16.18.1-3.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805207" version="1" comment="nodejs-nodemon is &lt;2.0.20-2.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805208" version="1" comment="npm is &lt;8.19.2-1.16.18.1.3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805209" version="1" comment="go-toolset is &lt;1.18.9-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805210" version="1" comment="golang is &lt;1.18.9-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805211" version="1" comment="golang-bin is &lt;1.18.9-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805212" version="1" comment="golang-docs is &lt;1.18.9-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805213" version="1" comment="golang-misc is &lt;1.18.9-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805214" version="1" comment="golang-race is &lt;1.18.9-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805215" version="1" comment="golang-src is &lt;1.18.9-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805216" version="1" comment="golang-tests is &lt;1.18.9-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805217" version="1" comment="curl is &lt;7.76.1-19.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805218" version="1" comment="curl-minimal is &lt;7.76.1-19.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805219" version="1" comment="libcurl is &lt;7.76.1-19.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805220" version="1" comment="libcurl-devel is &lt;7.76.1-19.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805221" version="1" comment="libcurl-minimal is &lt;7.76.1-19.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805222" version="1" comment="bpftool is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805223" version="1" comment="kernel is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805224" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-162.12.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805225" version="1" comment="kernel-core is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805226" version="1" comment="kernel-cross-headers is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805227" version="1" comment="kernel-debug is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805228" version="1" comment="kernel-debug-core is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805231" version="1" comment="kernel-debug-modules is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805232" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805235" version="1" comment="kernel-doc is &lt;5.14.0-162.12.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805236" version="1" comment="kernel-headers is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805237" version="1" comment="kernel-modules is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805238" version="1" comment="kernel-modules-extra is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805239" version="1" comment="kernel-tools is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805240" version="1" comment="kernel-tools-libs is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805242" version="1" comment="perf is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805243" version="1" comment="python3-perf is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805244" version="1" comment="dbus is &lt;1.12.20-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805245" version="1" comment="dbus-common is &lt;1.12.20-7.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805246" version="1" comment="dbus-daemon is &lt;1.12.20-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805247" version="1" comment="dbus-devel is &lt;1.12.20-7.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805248" version="1" comment="dbus-libs is &lt;1.12.20-7.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805249" version="1" comment="dbus-tools is &lt;1.12.20-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805250" version="1" comment="dbus-x11 is &lt;1.12.20-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805251" version="1" comment="systemd is &lt;250-12.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805252" version="1" comment="systemd-container is &lt;250-12.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805253" version="1" comment="systemd-devel is &lt;250-12.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805254" version="1" comment="systemd-journal-remote is &lt;250-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805255" version="1" comment="systemd-libs is &lt;250-12.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805256" version="1" comment="systemd-oomd is &lt;250-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805257" version="1" comment="systemd-pam is &lt;250-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805258" version="1" comment="systemd-resolved is &lt;250-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805259" version="1" comment="systemd-rpm-macros is &lt;250-12.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805260" version="1" comment="systemd-udev is &lt;250-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805261" version="1" comment="expat is &lt;2.4.9-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805262" version="1" comment="expat-devel is &lt;2.4.9-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805263" version="1" comment="libxml2 is &lt;2.9.13-3.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805264" version="1" comment="libxml2-devel is &lt;2.9.13-3.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805265" version="1" comment="python3-libxml2 is &lt;2.9.13-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805266" version="1" comment="sqlite is &lt;3.34.1-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805267" version="1" comment="sqlite-devel is &lt;3.34.1-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805268" version="1" comment="sqlite-libs is &lt;3.34.1-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805269" version="1" comment="bash is &lt;5.1.8-6.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805270" version="1" comment="bash-devel is &lt;5.1.8-6.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805271" version="1" comment="libtasn1 is &lt;4.16.0-8.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805272" version="1" comment="libtasn1-devel is &lt;4.16.0-8.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805273" version="1" comment="libtasn1-tools is &lt;4.16.0-8.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805274" version="1" comment="libXpm is &lt;3.5.13-8.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805275" version="1" comment="libXpm-devel is &lt;3.5.13-8.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805276" version="1" comment="thunderbird is &lt;102.7.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805277" version="1" comment="thunderbird is &lt;102.7.1-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805278" version="1" comment="git is &lt;2.31.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805279" version="1" comment="git-all is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805280" version="1" comment="git-core is &lt;2.31.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805281" version="1" comment="git-core-doc is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805282" version="1" comment="git-credential-libsecret is &lt;2.31.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805283" version="1" comment="git-daemon is &lt;2.31.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805284" version="1" comment="git-email is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805285" version="1" comment="git-gui is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805286" version="1" comment="git-instaweb is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805287" version="1" comment="git-subtree is &lt;2.31.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805288" version="1" comment="git-svn is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805289" version="1" comment="gitk is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805290" version="1" comment="gitweb is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805291" version="1" comment="perl-Git is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805292" version="1" comment="perl-Git-SVN is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805293" version="1" comment="tigervnc is &lt;1.12.0-5.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805294" version="1" comment="tigervnc-icons is &lt;1.12.0-5.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805295" version="1" comment="tigervnc-license is &lt;1.12.0-5.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805296" version="1" comment="tigervnc-selinux is &lt;1.12.0-5.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805297" version="1" comment="tigervnc-server is &lt;1.12.0-5.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805298" version="1" comment="tigervnc-server-minimal is &lt;1.12.0-5.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805299" version="1" comment="tigervnc-server-module is &lt;1.12.0-5.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805300" version="1" comment="libksba is &lt;1.5.1-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805301" version="1" comment="libksba-devel is &lt;1.5.1-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805302" version="1" comment="grub2-common is &lt;2.06-46.el9_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805303" version="1" comment="grub2-efi-x64 is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805304" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805305" version="1" comment="grub2-efi-x64-modules is &lt;2.06-46.el9_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805306" version="1" comment="grub2-pc is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805307" version="1" comment="grub2-pc-modules is &lt;2.06-46.el9_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805308" version="1" comment="grub2-tools is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805309" version="1" comment="grub2-tools-efi is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805310" version="1" comment="grub2-tools-extra is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805311" version="1" comment="grub2-tools-minimal is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805312" version="1" comment="firefox is &lt;102.8.0-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805313" version="1" comment="firefox-x11 is &lt;102.8.0-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805314" version="1" comment="thunderbird is &lt;102.8.0-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805315" version="1" comment="webkit2gtk3 is &lt;2.36.7-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805316" version="1" comment="webkit2gtk3-devel is &lt;2.36.7-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805317" version="1" comment="webkit2gtk3-jsc is &lt;2.36.7-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805318" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.36.7-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805319" version="1" comment="openssl is &lt;3.0.1-47.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805320" version="1" comment="openssl-devel is &lt;3.0.1-47.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805321" version="1" comment="openssl-libs is &lt;3.0.1-47.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805322" version="1" comment="openssl-perl is &lt;3.0.1-47.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805323" version="1" comment="bpftool is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805324" version="1" comment="kernel is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805325" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-162.18.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805326" version="1" comment="kernel-core is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805327" version="1" comment="kernel-cross-headers is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805328" version="1" comment="kernel-debug is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805329" version="1" comment="kernel-debug-core is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805332" version="1" comment="kernel-debug-modules is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805333" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805336" version="1" comment="kernel-doc is &lt;5.14.0-162.18.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805337" version="1" comment="kernel-headers is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805338" version="1" comment="kernel-modules is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805339" version="1" comment="kernel-modules-extra is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805340" version="1" comment="kernel-tools is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805341" version="1" comment="kernel-tools-libs is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805343" version="1" comment="perf is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805344" version="1" comment="python3-perf is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805345" version="1" comment="python3-setuptools is &lt;53.0.0-10.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805346" version="1" comment="python3-setuptools-wheel is &lt;53.0.0-10.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805347" version="1" comment="python-unversioned-command is &lt;3.9.14-1.el9_1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805348" version="1" comment="python3 is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805349" version="1" comment="python3-debug is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805350" version="1" comment="python3-devel is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805351" version="1" comment="python3-idle is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805352" version="1" comment="python3-libs is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805353" version="1" comment="python3-test is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805354" version="1" comment="python3-tkinter is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805355" version="1" comment="systemd is &lt;250-12.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805356" version="1" comment="systemd-container is &lt;250-12.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805357" version="1" comment="systemd-devel is &lt;250-12.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805358" version="1" comment="systemd-journal-remote is &lt;250-12.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805359" version="1" comment="systemd-libs is &lt;250-12.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805360" version="1" comment="systemd-oomd is &lt;250-12.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805361" version="1" comment="systemd-pam is &lt;250-12.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805362" version="1" comment="systemd-resolved is &lt;250-12.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805363" version="1" comment="systemd-rpm-macros is &lt;250-12.el9_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805364" version="1" comment="systemd-udev is &lt;250-12.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805365" version="1" comment="lua is &lt;5.4.4-2.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805366" version="1" comment="lua-devel is &lt;5.4.4-2.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805367" version="1" comment="lua-libs is &lt;5.4.4-2.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805368" version="1" comment="vim-X11 is &lt;8.2.2637-20.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805369" version="1" comment="vim-common is &lt;8.2.2637-20.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805370" version="1" comment="vim-enhanced is &lt;8.2.2637-20.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805371" version="1" comment="vim-filesystem is &lt;8.2.2637-20.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805372" version="1" comment="vim-minimal is &lt;8.2.2637-20.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805373" version="1" comment="tar is &lt;1.34-6.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805374" version="1" comment="php is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805375" version="1" comment="php-bcmath is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805376" version="1" comment="php-cli is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805377" version="1" comment="php-common is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805378" version="1" comment="php-dba is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805379" version="1" comment="php-dbg is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805380" version="1" comment="php-devel is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805381" version="1" comment="php-embedded is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805382" version="1" comment="php-enchant is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805383" version="1" comment="php-ffi is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805384" version="1" comment="php-fpm is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805385" version="1" comment="php-gd is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805386" version="1" comment="php-gmp is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805387" version="1" comment="php-intl is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805388" version="1" comment="php-ldap is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805389" version="1" comment="php-mbstring is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805390" version="1" comment="php-mysqlnd is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805391" version="1" comment="php-odbc is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805392" version="1" comment="php-opcache is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805393" version="1" comment="php-pdo is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805394" version="1" comment="php-pgsql is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805395" version="1" comment="php-process is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805396" version="1" comment="php-snmp is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805397" version="1" comment="php-soap is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805398" version="1" comment="php-xml is &lt;8.0.27-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805399" version="1" comment="httpd is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805400" version="1" comment="httpd-core is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805401" version="1" comment="httpd-devel is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805402" version="1" comment="httpd-filesystem is &lt;2.4.53-7.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805403" version="1" comment="httpd-manual is &lt;2.4.53-7.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805404" version="1" comment="httpd-tools is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805405" version="1" comment="mod_ldap is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805406" version="1" comment="mod_lua is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805407" version="1" comment="mod_proxy_html is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805408" version="1" comment="mod_session is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805409" version="1" comment="mod_ssl is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805410" version="1" comment="pcs is &lt;0.11.3-4.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805411" version="1" comment="pcs-snmp is &lt;0.11.3-4.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805412" version="1" comment="pesign is &lt;115-6.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805413" version="1" comment="libjpeg-turbo is &lt;2.0.90-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805414" version="1" comment="libjpeg-turbo-devel is &lt;2.0.90-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805415" version="1" comment="libjpeg-turbo-utils is &lt;2.0.90-6.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805416" version="1" comment="turbojpeg is &lt;2.0.90-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805417" version="1" comment="turbojpeg-devel is &lt;2.0.90-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805418" version="1" comment="gnutls is &lt;3.7.6-18.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805419" version="1" comment="gnutls-c++ is &lt;3.7.6-18.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805420" version="1" comment="gnutls-dane is &lt;3.7.6-18.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805421" version="1" comment="gnutls-devel is &lt;3.7.6-18.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805422" version="1" comment="gnutls-utils is &lt;3.7.6-18.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805423" version="1" comment="firefox is &lt;102.9.0-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805424" version="1" comment="firefox-x11 is &lt;102.9.0-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805425" version="1" comment="nspr is &lt;4.34.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805426" version="1" comment="nspr-devel is &lt;4.34.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805427" version="1" comment="nss is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805428" version="1" comment="nss-devel is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805429" version="1" comment="nss-softokn is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805430" version="1" comment="nss-softokn-devel is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805431" version="1" comment="nss-softokn-freebl is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805432" version="1" comment="nss-softokn-freebl-devel is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805433" version="1" comment="nss-sysinit is &lt;3.79.0-17.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805434" version="1" comment="nss-tools is &lt;3.79.0-17.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805435" version="1" comment="nss-util is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805436" version="1" comment="nss-util-devel is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805437" version="1" comment="thunderbird is &lt;102.9.0-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805438" version="1" comment="bpftool is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805439" version="1" comment="kernel is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805440" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-162.22.2.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805441" version="1" comment="kernel-core is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805442" version="1" comment="kernel-cross-headers is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805443" version="1" comment="kernel-debug is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805444" version="1" comment="kernel-debug-core is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805447" version="1" comment="kernel-debug-modules is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805448" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805451" version="1" comment="kernel-doc is &lt;5.14.0-162.22.2.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805452" version="1" comment="kernel-headers is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805453" version="1" comment="kernel-modules is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805454" version="1" comment="kernel-modules-extra is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805455" version="1" comment="kernel-tools is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805456" version="1" comment="kernel-tools-libs is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805458" version="1" comment="perf is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805459" version="1" comment="python3-perf is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805460" version="1" comment="pcs is &lt;0.11.3-4.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805461" version="1" comment="pcs-snmp is &lt;0.11.3-4.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805462" version="1" comment="tigervnc is &lt;1.12.0-5.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805463" version="1" comment="tigervnc-icons is &lt;1.12.0-5.el9_1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805464" version="1" comment="tigervnc-license is &lt;1.12.0-5.el9_1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805465" version="1" comment="tigervnc-selinux is &lt;1.12.0-5.el9_1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805466" version="1" comment="tigervnc-server is &lt;1.12.0-5.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805467" version="1" comment="tigervnc-server-minimal is &lt;1.12.0-5.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805468" version="1" comment="tigervnc-server-module is &lt;1.12.0-5.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805469" version="1" comment="httpd is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805470" version="1" comment="httpd-core is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805471" version="1" comment="httpd-devel is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805472" version="1" comment="httpd-filesystem is &lt;2.4.53-7.el9_1.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805473" version="1" comment="httpd-manual is &lt;2.4.53-7.el9_1.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805474" version="1" comment="httpd-tools is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805475" version="1" comment="mod_http2 is &lt;1.15.19-3.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805476" version="1" comment="mod_ldap is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805477" version="1" comment="mod_lua is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805478" version="1" comment="mod_proxy_html is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805479" version="1" comment="mod_session is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805480" version="1" comment="mod_ssl is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805481" version="1" comment="postgresql is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805482" version="1" comment="postgresql-contrib is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805483" version="1" comment="postgresql-docs is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805484" version="1" comment="postgresql-plperl is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805485" version="1" comment="postgresql-plpython3 is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805486" version="1" comment="postgresql-pltcl is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805487" version="1" comment="postgresql-private-devel is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805488" version="1" comment="postgresql-private-libs is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805489" version="1" comment="postgresql-server is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805490" version="1" comment="postgresql-server-devel is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805491" version="1" comment="postgresql-static is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805492" version="1" comment="postgresql-test is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805493" version="1" comment="postgresql-upgrade is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805494" version="1" comment="postgresql-upgrade-devel is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805495" version="1" comment="haproxy is &lt;2.4.17-3.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805496" version="1" comment="curl is &lt;7.76.1-19.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805497" version="1" comment="curl-minimal is &lt;7.76.1-19.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805498" version="1" comment="libcurl is &lt;7.76.1-19.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805499" version="1" comment="libcurl-devel is &lt;7.76.1-19.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805500" version="1" comment="libcurl-minimal is &lt;7.76.1-19.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805501" version="1" comment="bpftool is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805502" version="1" comment="kernel is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805503" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-162.23.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805504" version="1" comment="kernel-core is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805505" version="1" comment="kernel-cross-headers is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805506" version="1" comment="kernel-debug is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805507" version="1" comment="kernel-debug-core is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805510" version="1" comment="kernel-debug-modules is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805511" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805514" version="1" comment="kernel-doc is &lt;5.14.0-162.23.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805515" version="1" comment="kernel-headers is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805516" version="1" comment="kernel-modules is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805517" version="1" comment="kernel-modules-extra is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805518" version="1" comment="kernel-tools is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805519" version="1" comment="kernel-tools-libs is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805521" version="1" comment="perf is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805522" version="1" comment="python3-perf is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805523" version="1" comment="firefox is &lt;102.10.0-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805524" version="1" comment="firefox-x11 is &lt;102.10.0-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805525" version="1" comment="thunderbird is &lt;102.10.0-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805526" version="1" comment="java-17-openjdk is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805527" version="1" comment="java-17-openjdk-demo is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805528" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805529" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805530" version="1" comment="java-17-openjdk-devel is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805531" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805532" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805533" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805534" version="1" comment="java-17-openjdk-headless is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805535" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805536" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805537" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805538" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805539" version="1" comment="java-17-openjdk-jmods is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805540" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805541" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805542" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805543" version="1" comment="java-17-openjdk-src is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805544" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805545" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805546" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805547" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805548" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805549" version="1" comment="java-11-openjdk is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805550" version="1" comment="java-11-openjdk-demo is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805551" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805552" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805553" version="1" comment="java-11-openjdk-devel is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805554" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805555" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805556" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805557" version="1" comment="java-11-openjdk-headless is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805558" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805559" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805560" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805561" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805562" version="1" comment="java-11-openjdk-jmods is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805563" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805564" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805565" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805566" version="1" comment="java-11-openjdk-src is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805567" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805568" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805569" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805570" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805571" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805572" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805573" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805574" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805575" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805576" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805577" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805578" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805579" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805580" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805581" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805582" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805583" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.372.b07-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805584" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.372.b07-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805585" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805586" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805587" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805588" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805589" version="1" comment="webkit2gtk3 is &lt;2.36.7-1.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805590" version="1" comment="webkit2gtk3-devel is &lt;2.36.7-1.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805591" version="1" comment="webkit2gtk3-jsc is &lt;2.36.7-1.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805592" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.36.7-1.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805593" version="1" comment="emacs is &lt;27.2-6.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805594" version="1" comment="emacs-common is &lt;27.2-6.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805595" version="1" comment="emacs-filesystem is &lt;27.2-6.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805596" version="1" comment="emacs-lucid is &lt;27.2-6.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805597" version="1" comment="emacs-nox is &lt;27.2-6.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805598" version="1" comment="libwebp is &lt;1.2.0-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805599" version="1" comment="libwebp-devel is &lt;1.2.0-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805600" version="1" comment="ctdb is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805601" version="1" comment="libsmbclient is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805602" version="1" comment="libsmbclient-devel is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805603" version="1" comment="libwbclient is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805604" version="1" comment="libwbclient-devel is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805605" version="1" comment="python3-samba is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805606" version="1" comment="samba is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805607" version="1" comment="samba-client is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805608" version="1" comment="samba-client-libs is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805609" version="1" comment="samba-common is &lt;4.16.4-103.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805610" version="1" comment="samba-common-libs is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805611" version="1" comment="samba-common-tools is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805612" version="1" comment="samba-devel is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805613" version="1" comment="samba-krb5-printing is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805614" version="1" comment="samba-libs is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805615" version="1" comment="samba-pidl is &lt;4.16.4-103.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805616" version="1" comment="samba-test is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805617" version="1" comment="samba-test-libs is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805618" version="1" comment="samba-vfs-iouring is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805619" version="1" comment="samba-winbind is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805620" version="1" comment="samba-winbind-clients is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805621" version="1" comment="samba-winbind-krb5-locator is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805622" version="1" comment="samba-winbind-modules is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805623" version="1" comment="samba-winexe is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805624" version="1" comment="fence-agents-aliyun is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805625" version="1" comment="fence-agents-all is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805626" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805627" version="1" comment="fence-agents-apc is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805628" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805629" version="1" comment="fence-agents-aws is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805630" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805631" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805632" version="1" comment="fence-agents-brocade is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805633" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805634" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805635" version="1" comment="fence-agents-common is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805636" version="1" comment="fence-agents-compute is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805637" version="1" comment="fence-agents-drac5 is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805638" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805639" version="1" comment="fence-agents-emerson is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805640" version="1" comment="fence-agents-eps is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805641" version="1" comment="fence-agents-gce is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805642" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805643" version="1" comment="fence-agents-hpblade is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805644" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805645" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805646" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805647" version="1" comment="fence-agents-ifmib is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805648" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805649" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805650" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805651" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805652" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805653" version="1" comment="fence-agents-ipdu is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805654" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805655" version="1" comment="fence-agents-kdump is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805656" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805657" version="1" comment="fence-agents-mpath is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805658" version="1" comment="fence-agents-openstack is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805659" version="1" comment="fence-agents-redfish is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805660" version="1" comment="fence-agents-rhevm is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805661" version="1" comment="fence-agents-rsa is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805662" version="1" comment="fence-agents-rsb is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805663" version="1" comment="fence-agents-sbd is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805664" version="1" comment="fence-agents-scsi is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805665" version="1" comment="fence-agents-virsh is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805666" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805667" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805668" version="1" comment="fence-agents-wti is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805669" version="1" comment="fence-virt is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805670" version="1" comment="fence-virtd is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805671" version="1" comment="fence-virtd-cpg is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805672" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805673" version="1" comment="fence-virtd-multicast is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805674" version="1" comment="fence-virtd-serial is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805675" version="1" comment="fence-virtd-tcp is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805676" version="1" comment="ha-cloud-support is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805677" version="1" comment="qemu-guest-agent is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805678" version="1" comment="qemu-img is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805679" version="1" comment="qemu-kvm is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805680" version="1" comment="qemu-kvm-audio-pa is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805681" version="1" comment="qemu-kvm-block-curl is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805682" version="1" comment="qemu-kvm-block-rbd is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805683" version="1" comment="qemu-kvm-common is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805684" version="1" comment="qemu-kvm-core is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805685" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805686" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805687" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805688" version="1" comment="qemu-kvm-device-usb-host is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805689" version="1" comment="qemu-kvm-device-usb-redirect is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805690" version="1" comment="qemu-kvm-docs is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805691" version="1" comment="qemu-kvm-tools is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805692" version="1" comment="qemu-kvm-ui-egl-headless is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805693" version="1" comment="qemu-kvm-ui-opengl is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805694" version="1" comment="qemu-pr-helper is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805695" version="1" comment="edk2-ovmf is &lt;20221207gitfff6d81270b5-9.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805696" version="1" comment="edk2-tools is &lt;20221207gitfff6d81270b5-9.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805697" version="1" comment="edk2-tools-doc is &lt;20221207gitfff6d81270b5-9.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805698" version="1" comment="freeradius is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805699" version="1" comment="freeradius-devel is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805700" version="1" comment="freeradius-doc is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805701" version="1" comment="freeradius-krb5 is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805702" version="1" comment="freeradius-ldap is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805703" version="1" comment="freeradius-mysql is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805704" version="1" comment="freeradius-perl is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805705" version="1" comment="freeradius-postgresql is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805706" version="1" comment="freeradius-rest is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805707" version="1" comment="freeradius-sqlite is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805708" version="1" comment="freeradius-unixODBC is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805709" version="1" comment="freeradius-utils is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805710" version="1" comment="python3-freeradius is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805711" version="1" comment="grafana is &lt;9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805712" version="1" comment="grafana-pcp is &lt;5.1.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805713" version="1" comment="libguestfs-winsupport is &lt;9.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805714" version="1" comment="butane is &lt;0.16.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805715" version="1" comment="frr is &lt;8.3.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805716" version="1" comment="frr-selinux is &lt;8.3.1-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805717" version="1" comment="gdk-pixbuf2 is &lt;2.42.6-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805718" version="1" comment="gdk-pixbuf2-devel is &lt;2.42.6-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805719" version="1" comment="gdk-pixbuf2-modules is &lt;2.42.6-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805720" version="1" comment="conmon is &lt;2.1.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805721" version="1" comment="sysstat is &lt;12.5.4-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805722" version="1" comment="toolbox is &lt;0.0.99.3-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805723" version="1" comment="toolbox-tests is &lt;0.0.99.3-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805724" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-17.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805725" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-17.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805726" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-17.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805727" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-17.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805728" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-17.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805729" version="1" comment="xorg-x11-server-common is &lt;1.20.11-17.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805730" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-17.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805731" version="1" comment="xorg-x11-server-source is &lt;1.20.11-17.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805732" version="1" comment="xorg-x11-server-Xwayland is &lt;21.1.3-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805733" version="1" comment="buildah is &lt;1.29.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805734" version="1" comment="buildah-tests is &lt;1.29.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805735" version="1" comment="webkit2gtk3 is &lt;2.38.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805736" version="1" comment="webkit2gtk3-devel is &lt;2.38.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805737" version="1" comment="webkit2gtk3-jsc is &lt;2.38.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805738" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.38.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805739" version="1" comment="tigervnc is &lt;1.12.0-13.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805740" version="1" comment="tigervnc-icons is &lt;1.12.0-13.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805741" version="1" comment="tigervnc-license is &lt;1.12.0-13.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805742" version="1" comment="tigervnc-selinux is &lt;1.12.0-13.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805743" version="1" comment="tigervnc-server is &lt;1.12.0-13.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805744" version="1" comment="tigervnc-server-minimal is &lt;1.12.0-13.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805745" version="1" comment="tigervnc-server-module is &lt;1.12.0-13.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805746" version="1" comment="python3-mako is &lt;1.1.4-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805747" version="1" comment="poppler is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805748" version="1" comment="poppler-cpp is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805749" version="1" comment="poppler-cpp-devel is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805750" version="1" comment="poppler-devel is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805751" version="1" comment="poppler-glib is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805752" version="1" comment="poppler-glib-devel is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805753" version="1" comment="poppler-qt5 is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805754" version="1" comment="poppler-qt5-devel is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805755" version="1" comment="poppler-utils is &lt;21.01.0-14.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805756" version="1" comment="gstreamer1-plugins-good is &lt;1.18.4-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805757" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.18.4-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805758" version="1" comment="bind is &lt;9.16.23-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805759" version="1" comment="bind-chroot is &lt;9.16.23-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805760" version="1" comment="bind-devel is &lt;9.16.23-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805761" version="1" comment="bind-dnssec-doc is &lt;9.16.23-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805762" version="1" comment="bind-dnssec-utils is &lt;9.16.23-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805763" version="1" comment="bind-doc is &lt;9.16.23-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805764" version="1" comment="bind-libs is &lt;9.16.23-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805765" version="1" comment="bind-license is &lt;9.16.23-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805766" version="1" comment="bind-utils is &lt;9.16.23-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805767" version="1" comment="python3-bind is &lt;9.16.23-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805768" version="1" comment="podman is &lt;4.4.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805769" version="1" comment="podman-docker is &lt;4.4.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805770" version="1" comment="podman-gvproxy is &lt;4.4.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805771" version="1" comment="podman-plugins is &lt;4.4.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805772" version="1" comment="podman-remote is &lt;4.4.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805773" version="1" comment="podman-tests is &lt;4.4.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805774" version="1" comment="skopeo is &lt;1.11.2-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805775" version="1" comment="skopeo-tests is &lt;1.11.2-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805776" version="1" comment="idm-jss is &lt;5.3.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805777" version="1" comment="idm-ldapjdk is &lt;5.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805778" version="1" comment="idm-pki-acme is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805779" version="1" comment="idm-pki-base is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805780" version="1" comment="idm-pki-ca is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805781" version="1" comment="idm-pki-est is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805782" version="1" comment="idm-pki-java is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805783" version="1" comment="idm-pki-kra is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805784" version="1" comment="idm-pki-server is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805785" version="1" comment="idm-pki-tools is &lt;11.3.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805786" version="1" comment="idm-tomcatjss is &lt;8.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805787" version="1" comment="python3-idm-pki is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805788" version="1" comment="pki-jackson-annotations is &lt;2.14.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805789" version="1" comment="pki-jackson-core is &lt;2.14.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805790" version="1" comment="pki-jackson-databind is &lt;2.14.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805791" version="1" comment="pki-jackson-jaxrs-json-provider is &lt;2.14.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805792" version="1" comment="pki-jackson-jaxrs-providers is &lt;2.14.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805793" version="1" comment="pki-jackson-module-jaxb-annotations is &lt;2.14.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805794" version="1" comment="git is &lt;2.39.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805795" version="1" comment="git-all is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805796" version="1" comment="git-core is &lt;2.39.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805797" version="1" comment="git-core-doc is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805798" version="1" comment="git-credential-libsecret is &lt;2.39.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805799" version="1" comment="git-daemon is &lt;2.39.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805800" version="1" comment="git-email is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805801" version="1" comment="git-gui is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805802" version="1" comment="git-instaweb is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805803" version="1" comment="git-subtree is &lt;2.39.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805804" version="1" comment="git-svn is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805805" version="1" comment="gitk is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805806" version="1" comment="gitweb is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805807" version="1" comment="perl-Git is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805808" version="1" comment="perl-Git-SVN is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805809" version="1" comment="freerdp is &lt;2.4.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805810" version="1" comment="freerdp-devel is &lt;2.4.1-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805811" version="1" comment="freerdp-libs is &lt;2.4.1-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805812" version="1" comment="libwinpr is &lt;2.4.1-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805813" version="1" comment="libwinpr-devel is &lt;2.4.1-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805814" version="1" comment="libtiff is &lt;4.4.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805815" version="1" comment="libtiff-devel is &lt;4.4.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805816" version="1" comment="libtiff-tools is &lt;4.4.0-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805817" version="1" comment="git-lfs is &lt;3.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805818" version="1" comment="emacs is &lt;27.2-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805819" version="1" comment="emacs-common is &lt;27.2-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805820" version="1" comment="emacs-filesystem is &lt;27.2-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805821" version="1" comment="emacs-lucid is &lt;27.2-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805822" version="1" comment="emacs-nox is &lt;27.2-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805823" version="1" comment="containernetworking-plugins is &lt;1.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805824" version="1" comment="python3-unbound is &lt;1.16.2-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805825" version="1" comment="unbound is &lt;1.16.2-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805826" version="1" comment="unbound-devel is &lt;1.16.2-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805827" version="1" comment="unbound-libs is &lt;1.16.2-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805828" version="1" comment="wireshark is &lt;3.4.10-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805829" version="1" comment="wireshark-cli is &lt;3.4.10-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805830" version="1" comment="wireshark-devel is &lt;3.4.10-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805831" version="1" comment="postgresql-jdbc is &lt;42.2.27-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805832" version="1" comment="apcu-panel is &lt;5.1.21-1.module+el9.1.0.z+15477+cb86791d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805833" version="1" comment="php is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805834" version="1" comment="php-bcmath is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805835" version="1" comment="php-cli is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805836" version="1" comment="php-common is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805837" version="1" comment="php-dba is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805838" version="1" comment="php-dbg is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805839" version="1" comment="php-devel is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805840" version="1" comment="php-embedded is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805841" version="1" comment="php-enchant is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805842" version="1" comment="php-ffi is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805843" version="1" comment="php-fpm is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805844" version="1" comment="php-gd is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805845" version="1" comment="php-gmp is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805846" version="1" comment="php-intl is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805847" version="1" comment="php-ldap is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805848" version="1" comment="php-mbstring is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805849" version="1" comment="php-mysqlnd is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805850" version="1" comment="php-odbc is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805851" version="1" comment="php-opcache is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805852" version="1" comment="php-pdo is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805853" version="1" comment="php-pecl-apcu is &lt;5.1.21-1.module+el9.1.0.z+15477+cb86791d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805854" version="1" comment="php-pecl-apcu-devel is &lt;5.1.21-1.module+el9.1.0.z+15477+cb86791d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805855" version="1" comment="php-pecl-rrd is &lt;2.0.3-4.module+el9.1.0.z+15477+cb86791d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805856" version="1" comment="php-pecl-xdebug3 is &lt;3.1.4-1.module+el9.1.0.z+15477+cb86791d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805857" version="1" comment="php-pecl-zip is &lt;1.20.1-1.module+el9.1.0.z+15477+cb86791d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805858" version="1" comment="php-pgsql is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805859" version="1" comment="php-process is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805860" version="1" comment="php-snmp is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805861" version="1" comment="php-soap is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805862" version="1" comment="php-xml is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805863" version="1" comment="net-snmp is &lt;5.9.1-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805864" version="1" comment="net-snmp-agent-libs is &lt;5.9.1-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805865" version="1" comment="net-snmp-devel is &lt;5.9.1-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805866" version="1" comment="net-snmp-libs is &lt;5.9.1-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805867" version="1" comment="net-snmp-perl is &lt;5.9.1-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805868" version="1" comment="net-snmp-utils is &lt;5.9.1-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805869" version="1" comment="python3-net-snmp is &lt;5.9.1-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805870" version="1" comment="libtpms is &lt;0.9.1-3.20211126git1ff6fe1f43.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805871" version="1" comment="bpftool is &lt;7.0.0-284.11.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805872" version="1" comment="kernel is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805873" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-284.11.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805874" version="1" comment="kernel-core is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805875" version="1" comment="kernel-cross-headers is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805876" version="1" comment="kernel-debug is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805877" version="1" comment="kernel-debug-core is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805880" version="1" comment="kernel-debug-modules is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805881" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805882" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805883" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805886" version="1" comment="kernel-doc is &lt;5.14.0-284.11.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805887" version="1" comment="kernel-headers is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805888" version="1" comment="kernel-modules is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805889" version="1" comment="kernel-modules-core is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805890" version="1" comment="kernel-modules-extra is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805891" version="1" comment="kernel-tools is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805892" version="1" comment="kernel-tools-libs is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805894" version="1" comment="kernel-uki-virt is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805895" version="1" comment="perf is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805896" version="1" comment="python3-perf is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805897" version="1" comment="rtla is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805898" version="1" comment="device-mapper-multipath is &lt;0.8.7-20.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805899" version="1" comment="device-mapper-multipath-devel is &lt;0.8.7-20.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805900" version="1" comment="device-mapper-multipath-libs is &lt;0.8.7-20.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805901" version="1" comment="kpartx is &lt;0.8.7-20.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805902" version="1" comment="curl is &lt;7.76.1-23.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805903" version="1" comment="curl-minimal is &lt;7.76.1-23.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805904" version="1" comment="libcurl is &lt;7.76.1-23.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805905" version="1" comment="libcurl-devel is &lt;7.76.1-23.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805906" version="1" comment="libcurl-minimal is &lt;7.76.1-23.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805907" version="1" comment="fwupd is &lt;1.8.10-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805908" version="1" comment="fwupd-devel is &lt;1.8.10-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805909" version="1" comment="fwupd-plugin-flashrom is &lt;1.8.10-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805910" version="1" comment="dhcp-client is &lt;4.4.2-18.b1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805911" version="1" comment="dhcp-common is &lt;4.4.2-18.b1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805912" version="1" comment="dhcp-relay is &lt;4.4.2-18.b1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805913" version="1" comment="dhcp-server is &lt;4.4.2-18.b1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981840" version="1" comment="ctdb is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805914" version="1" comment="evolution-mapi is &lt;3.40.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805915" version="1" comment="evolution-mapi-langpacks is &lt;3.40.1-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805916" version="1" comment="libnetapi is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981841" version="1" comment="libnetapi-devel is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805917" version="1" comment="libsmbclient is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981842" version="1" comment="libsmbclient-devel is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805918" version="1" comment="libwbclient is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981843" version="1" comment="libwbclient-devel is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805919" version="1" comment="openchange is &lt;2.3-40.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805920" version="1" comment="python3-samba is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805921" version="1" comment="python3-samba-dc is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981844" version="1" comment="python3-samba-devel is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981845" version="1" comment="python3-samba-test is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805922" version="1" comment="samba is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805923" version="1" comment="samba-client is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805924" version="1" comment="samba-client-libs is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805925" version="1" comment="samba-common is &lt;4.17.5-102.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805926" version="1" comment="samba-common-libs is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805927" version="1" comment="samba-common-tools is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805928" version="1" comment="samba-dc-libs is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805929" version="1" comment="samba-dcerpc is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981846" version="1" comment="samba-devel is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805930" version="1" comment="samba-krb5-printing is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805931" version="1" comment="samba-ldb-ldap-modules is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805932" version="1" comment="samba-libs is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981847" version="1" comment="samba-pidl is &lt;4.17.5-102.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981848" version="1" comment="samba-test is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981849" version="1" comment="samba-test-libs is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805933" version="1" comment="samba-tools is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805934" version="1" comment="samba-usershares is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805935" version="1" comment="samba-vfs-iouring is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805936" version="1" comment="samba-winbind is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805937" version="1" comment="samba-winbind-clients is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805938" version="1" comment="samba-winbind-krb5-locator is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805939" version="1" comment="samba-winbind-modules is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805940" version="1" comment="samba-winexe is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805941" version="1" comment="openssl is &lt;3.0.7-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805942" version="1" comment="openssl-devel is &lt;3.0.7-6.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805943" version="1" comment="openssl-libs is &lt;3.0.7-6.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805944" version="1" comment="openssl-perl is &lt;3.0.7-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805945" version="1" comment="bsdtar is &lt;3.5.3-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805946" version="1" comment="libarchive is &lt;3.5.3-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805947" version="1" comment="libarchive-devel is &lt;3.5.3-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805948" version="1" comment="krb5-devel is &lt;1.20.1-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805949" version="1" comment="krb5-libs is &lt;1.20.1-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805950" version="1" comment="krb5-pkinit is &lt;1.20.1-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805951" version="1" comment="krb5-server is &lt;1.20.1-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805952" version="1" comment="krb5-server-ldap is &lt;1.20.1-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805953" version="1" comment="krb5-workstation is &lt;1.20.1-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805954" version="1" comment="libkadm5 is &lt;1.20.1-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805955" version="1" comment="lua is &lt;5.4.4-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805956" version="1" comment="lua-devel is &lt;5.4.4-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805957" version="1" comment="lua-libs is &lt;5.4.4-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811010" version="1" comment="autotrace is &lt;0.31.1-65.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811011" version="1" comment="golang-github-cpuguy83-md2man is &lt;2.0.2-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805958" version="1" comment="mysql is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805959" version="1" comment="mysql-common is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805960" version="1" comment="mysql-devel is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805961" version="1" comment="mysql-errmsg is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805962" version="1" comment="mysql-libs is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805963" version="1" comment="mysql-server is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805964" version="1" comment="mysql-test is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805965" version="1" comment="emacs is &lt;27.2-8.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805966" version="1" comment="emacs-common is &lt;27.2-8.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805967" version="1" comment="emacs-filesystem is &lt;27.2-8.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805968" version="1" comment="emacs-lucid is &lt;27.2-8.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805969" version="1" comment="emacs-nox is &lt;27.2-8.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805970" version="1" comment="libreswan is &lt;4.9-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805971" version="1" comment="openssh is &lt;8.7p1-29.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805972" version="1" comment="openssh-askpass is &lt;8.7p1-29.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805973" version="1" comment="openssh-clients is &lt;8.7p1-29.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805974" version="1" comment="openssh-keycat is &lt;8.7p1-29.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805975" version="1" comment="openssh-server is &lt;8.7p1-29.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805976" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.29.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805977" version="1" comment="curl is &lt;7.76.1-23.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805978" version="1" comment="curl-minimal is &lt;7.76.1-23.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805979" version="1" comment="libcurl is &lt;7.76.1-23.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805980" version="1" comment="libcurl-devel is &lt;7.76.1-23.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805981" version="1" comment="libcurl-minimal is &lt;7.76.1-23.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805982" version="1" comment="pcs is &lt;0.11.4-7.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805983" version="1" comment="pcs-snmp is &lt;0.11.4-7.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805984" version="1" comment="webkit2gtk3 is &lt;2.38.5-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805985" version="1" comment="webkit2gtk3-devel is &lt;2.38.5-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805986" version="1" comment="webkit2gtk3-jsc is &lt;2.38.5-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805987" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.38.5-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805988" version="1" comment="nodejs is &lt;18.14.2-2.module+el9.2.0.z+18497+a402347c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805989" version="1" comment="nodejs-devel is &lt;18.14.2-2.module+el9.2.0.z+18497+a402347c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805990" version="1" comment="nodejs-docs is &lt;18.14.2-2.module+el9.2.0.z+18497+a402347c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805991" version="1" comment="nodejs-full-i18n is &lt;18.14.2-2.module+el9.2.0.z+18497+a402347c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805992" version="1" comment="nodejs-nodemon is &lt;2.0.20-2.module+el9.2.0.z+18497+a402347c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805993" version="1" comment="npm is &lt;9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805994" version="1" comment="nodejs is &lt;16.19.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805995" version="1" comment="nodejs-docs is &lt;16.19.1-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805996" version="1" comment="nodejs-full-i18n is &lt;16.19.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805997" version="1" comment="nodejs-libs is &lt;16.19.1-1.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805998" version="1" comment="nodejs-nodemon is &lt;2.0.20-3.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805999" version="1" comment="npm is &lt;8.19.3-1.16.19.1.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806000" version="1" comment="firefox is &lt;102.11.0-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806001" version="1" comment="firefox-x11 is &lt;102.11.0-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806002" version="1" comment="apr-util is &lt;1.6.1-20.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806003" version="1" comment="apr-util-bdb is &lt;1.6.1-20.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806004" version="1" comment="apr-util-devel is &lt;1.6.1-20.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806005" version="1" comment="apr-util-ldap is &lt;1.6.1-20.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806006" version="1" comment="apr-util-mysql is &lt;1.6.1-20.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806007" version="1" comment="apr-util-odbc is &lt;1.6.1-20.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806008" version="1" comment="apr-util-openssl is &lt;1.6.1-20.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806009" version="1" comment="apr-util-pgsql is &lt;1.6.1-20.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806010" version="1" comment="apr-util-sqlite is &lt;1.6.1-20.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806011" version="1" comment="libreswan is &lt;4.9-4.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806012" version="1" comment="thunderbird is &lt;102.11.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806013" version="1" comment="git is &lt;2.39.3-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806014" version="1" comment="git-all is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806015" version="1" comment="git-core is &lt;2.39.3-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806016" version="1" comment="git-core-doc is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806017" version="1" comment="git-credential-libsecret is &lt;2.39.3-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806018" version="1" comment="git-daemon is &lt;2.39.3-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806019" version="1" comment="git-email is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806020" version="1" comment="git-gui is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806021" version="1" comment="git-instaweb is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806022" version="1" comment="git-subtree is &lt;2.39.3-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806023" version="1" comment="git-svn is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806024" version="1" comment="gitk is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806025" version="1" comment="gitweb is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806026" version="1" comment="perl-Git is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806027" version="1" comment="perl-Git-SVN is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806028" version="1" comment="go-toolset is &lt;1.19.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806029" version="1" comment="golang is &lt;1.19.9-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806030" version="1" comment="golang-bin is &lt;1.19.9-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806031" version="1" comment="golang-docs is &lt;1.19.9-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806032" version="1" comment="golang-misc is &lt;1.19.9-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806033" version="1" comment="golang-race is &lt;1.19.9-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806034" version="1" comment="golang-src is &lt;1.19.9-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806035" version="1" comment="golang-tests is &lt;1.19.9-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806036" version="1" comment="cups-filters is &lt;1.28.7-11.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806037" version="1" comment="cups-filters-devel is &lt;1.28.7-11.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806038" version="1" comment="cups-filters-libs is &lt;1.28.7-11.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806039" version="1" comment="webkit2gtk3 is &lt;2.38.5-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806040" version="1" comment="webkit2gtk3-devel is &lt;2.38.5-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806041" version="1" comment="webkit2gtk3-jsc is &lt;2.38.5-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806042" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.38.5-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806043" version="1" comment="c-ares is &lt;1.17.1-5.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806044" version="1" comment="c-ares-devel is &lt;1.17.1-5.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806045" version="1" comment="nodejs is &lt;18.14.2-3.module+el9.2.0.z+18964+42696395 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806046" version="1" comment="nodejs-devel is &lt;18.14.2-3.module+el9.2.0.z+18964+42696395 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806047" version="1" comment="nodejs-docs is &lt;18.14.2-3.module+el9.2.0.z+18964+42696395 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806048" version="1" comment="nodejs-full-i18n is &lt;18.14.2-3.module+el9.2.0.z+18964+42696395 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806049" version="1" comment="npm is &lt;9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806050" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.18-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806051" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.18-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806052" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.18-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806053" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.18-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806054" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.18-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806055" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.118-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806056" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.118-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806057" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.18-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806058" version="1" comment="dotnet-templates-6.0 is &lt;6.0.118-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806059" version="1" comment="python3.11 is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806060" version="1" comment="python3.11-debug is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806061" version="1" comment="python3.11-devel is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806062" version="1" comment="python3.11-idle is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806063" version="1" comment="python3.11-libs is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806064" version="1" comment="python3.11-test is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806065" version="1" comment="python3.11-tkinter is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806066" version="1" comment="nodejs is &lt;16.19.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806067" version="1" comment="nodejs-docs is &lt;16.19.1-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806068" version="1" comment="nodejs-full-i18n is &lt;16.19.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806069" version="1" comment="nodejs-libs is &lt;16.19.1-2.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806070" version="1" comment="npm is &lt;8.19.3-1.16.19.1.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806071" version="1" comment="thunderbird is &lt;102.12.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806072" version="1" comment="firefox is &lt;102.12.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806073" version="1" comment="firefox-x11 is &lt;102.12.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806074" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806075" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806076" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806077" version="1" comment="dotnet-host is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806078" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806079" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806080" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.107-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806081" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.107-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806082" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806083" version="1" comment="dotnet-templates-7.0 is &lt;7.0.107-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806084" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.107-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806085" version="1" comment="python-unversioned-command is &lt;3.9.16-1.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806086" version="1" comment="python3 is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806087" version="1" comment="python3-debug is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806088" version="1" comment="python3-devel is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806089" version="1" comment="python3-idle is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806090" version="1" comment="python3-libs is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806091" version="1" comment="python3-test is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806092" version="1" comment="python3-tkinter is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806093" version="1" comment="texlive is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806094" version="1" comment="texlive-adjustbox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806095" version="1" comment="texlive-ae is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806096" version="1" comment="texlive-algorithms is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806097" version="1" comment="texlive-alphalph is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806098" version="1" comment="texlive-amscls is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806099" version="1" comment="texlive-amsfonts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806100" version="1" comment="texlive-amsmath is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806101" version="1" comment="texlive-anyfontsize is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806102" version="1" comment="texlive-anysize is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806103" version="1" comment="texlive-appendix is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806104" version="1" comment="texlive-arabxetex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806105" version="1" comment="texlive-arphic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806106" version="1" comment="texlive-atbegshi is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806107" version="1" comment="texlive-attachfile is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806108" version="1" comment="texlive-attachfile2 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806109" version="1" comment="texlive-atveryend is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806110" version="1" comment="texlive-auxhook is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806111" version="1" comment="texlive-avantgar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806112" version="1" comment="texlive-awesomebox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806113" version="1" comment="texlive-babel is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806114" version="1" comment="texlive-babel-english is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806115" version="1" comment="texlive-babelbib is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806116" version="1" comment="texlive-base is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806117" version="1" comment="texlive-beamer is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806118" version="1" comment="texlive-bera is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806119" version="1" comment="texlive-beton is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806120" version="1" comment="texlive-bibtex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806121" version="1" comment="texlive-bibtopic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806122" version="1" comment="texlive-bidi is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806123" version="1" comment="texlive-bigfoot is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806124" version="1" comment="texlive-bigintcalc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806125" version="1" comment="texlive-bitset is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806126" version="1" comment="texlive-bookman is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806127" version="1" comment="texlive-bookmark is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806128" version="1" comment="texlive-booktabs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806129" version="1" comment="texlive-breakurl is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806130" version="1" comment="texlive-breqn is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806131" version="1" comment="texlive-capt-of is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806132" version="1" comment="texlive-caption is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806133" version="1" comment="texlive-carlisle is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806134" version="1" comment="texlive-catchfile is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806135" version="1" comment="texlive-changebar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806136" version="1" comment="texlive-changepage is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806137" version="1" comment="texlive-charter is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806138" version="1" comment="texlive-chngcntr is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806139" version="1" comment="texlive-cite is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806140" version="1" comment="texlive-cjk is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806141" version="1" comment="texlive-classpack is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806142" version="1" comment="texlive-cm is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806143" version="1" comment="texlive-cm-lgc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806144" version="1" comment="texlive-cm-super is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806145" version="1" comment="texlive-cmap is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806146" version="1" comment="texlive-cmextra is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806147" version="1" comment="texlive-cns is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806148" version="1" comment="texlive-collectbox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806149" version="1" comment="texlive-collection-basic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806150" version="1" comment="texlive-collection-fontsrecommended is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806151" version="1" comment="texlive-collection-htmlxml is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806152" version="1" comment="texlive-collection-latex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806153" version="1" comment="texlive-collection-latexrecommended is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806154" version="1" comment="texlive-collection-xetex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806155" version="1" comment="texlive-colorprofiles is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806156" version="1" comment="texlive-colortbl is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806157" version="1" comment="texlive-context is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806158" version="1" comment="texlive-courier is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806159" version="1" comment="texlive-crop is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806160" version="1" comment="texlive-csquotes is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806161" version="1" comment="texlive-ctable is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806162" version="1" comment="texlive-ctablestack is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806163" version="1" comment="texlive-currfile is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806164" version="1" comment="texlive-datetime is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806165" version="1" comment="texlive-dehyph is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806166" version="1" comment="texlive-dvipdfmx is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806167" version="1" comment="texlive-dvipng is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806168" version="1" comment="texlive-dvips is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806169" version="1" comment="texlive-dvisvgm is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806170" version="1" comment="texlive-ec is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806171" version="1" comment="texlive-eepic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806172" version="1" comment="texlive-enctex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806173" version="1" comment="texlive-enumitem is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806174" version="1" comment="texlive-environ is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806175" version="1" comment="texlive-epsf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806176" version="1" comment="texlive-epstopdf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806177" version="1" comment="texlive-epstopdf-pkg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806178" version="1" comment="texlive-eqparbox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806179" version="1" comment="texlive-eso-pic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806180" version="1" comment="texlive-etex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806181" version="1" comment="texlive-etex-pkg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806182" version="1" comment="texlive-etexcmds is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806183" version="1" comment="texlive-etoc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806184" version="1" comment="texlive-etoolbox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806185" version="1" comment="texlive-euenc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806186" version="1" comment="texlive-euler is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806187" version="1" comment="texlive-euro is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806188" version="1" comment="texlive-eurosym is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806189" version="1" comment="texlive-extsizes is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806190" version="1" comment="texlive-fancybox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806191" version="1" comment="texlive-fancyhdr is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806192" version="1" comment="texlive-fancyref is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806193" version="1" comment="texlive-fancyvrb is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806194" version="1" comment="texlive-filecontents is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806195" version="1" comment="texlive-filehook is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806196" version="1" comment="texlive-finstrut is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806197" version="1" comment="texlive-fix2col is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806198" version="1" comment="texlive-fixlatvian is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806199" version="1" comment="texlive-float is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806200" version="1" comment="texlive-fmtcount is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806201" version="1" comment="texlive-fncychap is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806202" version="1" comment="texlive-fontawesome is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806203" version="1" comment="texlive-fontbook is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806204" version="1" comment="texlive-fonts-tlwg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806205" version="1" comment="texlive-fontspec is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806206" version="1" comment="texlive-fontware is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806207" version="1" comment="texlive-fontwrap is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806208" version="1" comment="texlive-footmisc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806209" version="1" comment="texlive-footnotehyper is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806210" version="1" comment="texlive-fp is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806211" version="1" comment="texlive-fpl is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806212" version="1" comment="texlive-framed is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806213" version="1" comment="texlive-garuda-c90 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806214" version="1" comment="texlive-geometry is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806215" version="1" comment="texlive-gettitlestring is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806216" version="1" comment="texlive-glyphlist is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806217" version="1" comment="texlive-gnu-freefont is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806218" version="1" comment="texlive-graphics is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806219" version="1" comment="texlive-graphics-cfg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806220" version="1" comment="texlive-graphics-def is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806221" version="1" comment="texlive-grfext is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806222" version="1" comment="texlive-grffile is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806223" version="1" comment="texlive-gsftopk is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806224" version="1" comment="texlive-hanging is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806225" version="1" comment="texlive-helvetic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806226" version="1" comment="texlive-hobsub is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806227" version="1" comment="texlive-hologo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806228" version="1" comment="texlive-hycolor is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806229" version="1" comment="texlive-hyperref is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806230" version="1" comment="texlive-hyph-utf8 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806231" version="1" comment="texlive-hyphen-base is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806232" version="1" comment="texlive-hyphenat is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806233" version="1" comment="texlive-hyphenex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806234" version="1" comment="texlive-ifetex is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806235" version="1" comment="texlive-ifluatex is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806236" version="1" comment="texlive-ifmtarg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806237" version="1" comment="texlive-ifoddpage is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806238" version="1" comment="texlive-ifplatform is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806239" version="1" comment="texlive-iftex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806240" version="1" comment="texlive-ifxetex is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806241" version="1" comment="texlive-import is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806242" version="1" comment="texlive-index is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806243" version="1" comment="texlive-infwarerr is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806244" version="1" comment="texlive-intcalc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806245" version="1" comment="texlive-jadetex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806246" version="1" comment="texlive-jknapltx is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806247" version="1" comment="texlive-kastrup is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806248" version="1" comment="texlive-kerkis is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806249" version="1" comment="texlive-knuth-lib is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806250" version="1" comment="texlive-knuth-local is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806251" version="1" comment="texlive-koma-script is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806252" version="1" comment="texlive-kpathsea is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806253" version="1" comment="texlive-kvdefinekeys is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806254" version="1" comment="texlive-kvoptions is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806255" version="1" comment="texlive-kvsetkeys is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806256" version="1" comment="texlive-l3backend is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806257" version="1" comment="texlive-l3experimental is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806258" version="1" comment="texlive-l3kernel is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806259" version="1" comment="texlive-l3packages is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806260" version="1" comment="texlive-lastpage is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806261" version="1" comment="texlive-latex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806262" version="1" comment="texlive-latex-fonts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806263" version="1" comment="texlive-latex2man is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806264" version="1" comment="texlive-latexbug is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806265" version="1" comment="texlive-latexconfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806266" version="1" comment="texlive-letltxmacro is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806267" version="1" comment="texlive-lettrine is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806268" version="1" comment="texlive-lib is &lt;20200406-26.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806269" version="1" comment="texlive-lib-devel is &lt;20200406-26.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806270" version="1" comment="texlive-linegoal is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806271" version="1" comment="texlive-lineno is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806272" version="1" comment="texlive-listings is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806273" version="1" comment="texlive-listofitems is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806274" version="1" comment="texlive-lm is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806275" version="1" comment="texlive-lm-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806276" version="1" comment="texlive-ltabptch is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806277" version="1" comment="texlive-ltxcmds is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806278" version="1" comment="texlive-ltxmisc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806279" version="1" comment="texlive-lua-alt-getopt is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806280" version="1" comment="texlive-luahbtex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806281" version="1" comment="texlive-lualatex-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806282" version="1" comment="texlive-lualibs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806283" version="1" comment="texlive-luaotfload is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806284" version="1" comment="texlive-luatex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806285" version="1" comment="texlive-luatex85 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806286" version="1" comment="texlive-luatexbase is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806287" version="1" comment="texlive-lwarp is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806288" version="1" comment="texlive-makecmds is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806289" version="1" comment="texlive-makeindex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806290" version="1" comment="texlive-manfnt-font is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806291" version="1" comment="texlive-marginnote is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806292" version="1" comment="texlive-marvosym is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806293" version="1" comment="texlive-mathpazo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806294" version="1" comment="texlive-mathspec is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806295" version="1" comment="texlive-mathtools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806296" version="1" comment="texlive-mdwtools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806297" version="1" comment="texlive-memoir is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806298" version="1" comment="texlive-metafont is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806299" version="1" comment="texlive-metalogo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806300" version="1" comment="texlive-metapost is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806301" version="1" comment="texlive-mflogo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806302" version="1" comment="texlive-mflogo-font is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806303" version="1" comment="texlive-mfnfss is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806304" version="1" comment="texlive-mfware is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806305" version="1" comment="texlive-microtype is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806306" version="1" comment="texlive-minitoc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806307" version="1" comment="texlive-mnsymbol is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806308" version="1" comment="texlive-modes is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806309" version="1" comment="texlive-mparhack is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806310" version="1" comment="texlive-mptopdf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806311" version="1" comment="texlive-ms is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806312" version="1" comment="texlive-multido is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806313" version="1" comment="texlive-multirow is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806314" version="1" comment="texlive-natbib is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806315" version="1" comment="texlive-ncctools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806316" version="1" comment="texlive-ncntrsbk is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806317" version="1" comment="texlive-needspace is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806318" version="1" comment="texlive-newfloat is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806319" version="1" comment="texlive-newunicodechar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806320" version="1" comment="texlive-norasi-c90 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806321" version="1" comment="texlive-notoccite is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806322" version="1" comment="texlive-ntgclass is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806323" version="1" comment="texlive-oberdiek is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806324" version="1" comment="texlive-obsolete is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806325" version="1" comment="texlive-overpic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806326" version="1" comment="texlive-palatino is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806327" version="1" comment="texlive-paralist is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806328" version="1" comment="texlive-parallel is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806329" version="1" comment="texlive-parskip is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806330" version="1" comment="texlive-passivetex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806331" version="1" comment="texlive-pdfcolmk is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806332" version="1" comment="texlive-pdfescape is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806333" version="1" comment="texlive-pdflscape is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806334" version="1" comment="texlive-pdfpages is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806335" version="1" comment="texlive-pdftex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806336" version="1" comment="texlive-pdftexcmds is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806337" version="1" comment="texlive-pgf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806338" version="1" comment="texlive-philokalia is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806339" version="1" comment="texlive-placeins is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806340" version="1" comment="texlive-plain is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806341" version="1" comment="texlive-polyglossia is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806342" version="1" comment="texlive-powerdot is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806343" version="1" comment="texlive-preprint is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806344" version="1" comment="texlive-psfrag is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806345" version="1" comment="texlive-pslatex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806346" version="1" comment="texlive-psnfss is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806347" version="1" comment="texlive-pspicture is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806348" version="1" comment="texlive-pst-3d is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806349" version="1" comment="texlive-pst-arrow is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806350" version="1" comment="texlive-pst-blur is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806351" version="1" comment="texlive-pst-coil is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806352" version="1" comment="texlive-pst-eps is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806353" version="1" comment="texlive-pst-fill is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806354" version="1" comment="texlive-pst-grad is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806355" version="1" comment="texlive-pst-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806356" version="1" comment="texlive-pst-node is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806357" version="1" comment="texlive-pst-plot is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806358" version="1" comment="texlive-pst-slpe is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806359" version="1" comment="texlive-pst-text is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806360" version="1" comment="texlive-pst-tools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806361" version="1" comment="texlive-pst-tree is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806362" version="1" comment="texlive-pstricks is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806363" version="1" comment="texlive-pstricks-add is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806364" version="1" comment="texlive-ptext is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806365" version="1" comment="texlive-pxfonts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806366" version="1" comment="texlive-qstest is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806367" version="1" comment="texlive-ragged2e is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806368" version="1" comment="texlive-rcs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806369" version="1" comment="texlive-realscripts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806370" version="1" comment="texlive-refcount is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806371" version="1" comment="texlive-rerunfilecheck is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806372" version="1" comment="texlive-rsfs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806373" version="1" comment="texlive-sansmath is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806374" version="1" comment="texlive-sansmathaccent is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806375" version="1" comment="texlive-sauerj is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806376" version="1" comment="texlive-scheme-basic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806377" version="1" comment="texlive-section is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806378" version="1" comment="texlive-sectsty is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806379" version="1" comment="texlive-seminar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806380" version="1" comment="texlive-sepnum is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806381" version="1" comment="texlive-setspace is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806382" version="1" comment="texlive-showexpl is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806383" version="1" comment="texlive-soul is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806384" version="1" comment="texlive-stackengine is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806385" version="1" comment="texlive-stmaryrd is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806386" version="1" comment="texlive-stringenc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806387" version="1" comment="texlive-subfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806388" version="1" comment="texlive-subfigure is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806389" version="1" comment="texlive-svn-prov is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806390" version="1" comment="texlive-symbol is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806391" version="1" comment="texlive-t2 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806392" version="1" comment="texlive-tabu is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806393" version="1" comment="texlive-tabulary is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806394" version="1" comment="texlive-tetex is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806395" version="1" comment="texlive-tex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806396" version="1" comment="texlive-tex-gyre is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806397" version="1" comment="texlive-tex-gyre-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806398" version="1" comment="texlive-tex-ini-files is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806399" version="1" comment="texlive-tex4ht is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806400" version="1" comment="texlive-texconfig is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806401" version="1" comment="texlive-texlive-common-doc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806402" version="1" comment="texlive-texlive-docindex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806403" version="1" comment="texlive-texlive-en is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806404" version="1" comment="texlive-texlive-msg-translations is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806405" version="1" comment="texlive-texlive-scripts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806406" version="1" comment="texlive-texlive-scripts-extra is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806407" version="1" comment="texlive-texlive.infra is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806408" version="1" comment="texlive-textcase is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806409" version="1" comment="texlive-textpos is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806410" version="1" comment="texlive-threeparttable is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806411" version="1" comment="texlive-thumbpdf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806412" version="1" comment="texlive-times is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806413" version="1" comment="texlive-tipa is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806414" version="1" comment="texlive-titlesec is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806415" version="1" comment="texlive-titling is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806416" version="1" comment="texlive-tocloft is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806417" version="1" comment="texlive-tools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806418" version="1" comment="texlive-translator is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806419" version="1" comment="texlive-trimspaces is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806420" version="1" comment="texlive-txfonts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806421" version="1" comment="texlive-type1cm is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806422" version="1" comment="texlive-typehtml is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806423" version="1" comment="texlive-ucharcat is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806424" version="1" comment="texlive-ucharclasses is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806425" version="1" comment="texlive-ucs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806426" version="1" comment="texlive-uhc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806427" version="1" comment="texlive-ulem is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806428" version="1" comment="texlive-underscore is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806429" version="1" comment="texlive-unicode-data is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806430" version="1" comment="texlive-unicode-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806431" version="1" comment="texlive-uniquecounter is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806432" version="1" comment="texlive-unisugar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806433" version="1" comment="texlive-updmap-map is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806434" version="1" comment="texlive-upquote is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806435" version="1" comment="texlive-url is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806436" version="1" comment="texlive-utopia is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806437" version="1" comment="texlive-varwidth is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806438" version="1" comment="texlive-wadalab is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806439" version="1" comment="texlive-was is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806440" version="1" comment="texlive-wasy is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806441" version="1" comment="texlive-wasy-type1 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806442" version="1" comment="texlive-wasy2-ps is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806443" version="1" comment="texlive-wasysym is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806444" version="1" comment="texlive-wrapfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806445" version="1" comment="texlive-xcolor is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806446" version="1" comment="texlive-xdvi is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806447" version="1" comment="texlive-xecjk is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806448" version="1" comment="texlive-xecolor is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806449" version="1" comment="texlive-xecyr is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806450" version="1" comment="texlive-xeindex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806451" version="1" comment="texlive-xepersian is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806452" version="1" comment="texlive-xesearch is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806453" version="1" comment="texlive-xetex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806454" version="1" comment="texlive-xetex-itrans is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806455" version="1" comment="texlive-xetex-pstricks is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806456" version="1" comment="texlive-xetex-tibetan is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806457" version="1" comment="texlive-xetexconfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806458" version="1" comment="texlive-xetexfontinfo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806459" version="1" comment="texlive-xifthen is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806460" version="1" comment="texlive-xkeyval is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806461" version="1" comment="texlive-xltxtra is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806462" version="1" comment="texlive-xmltex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806463" version="1" comment="texlive-xmltexconfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806464" version="1" comment="texlive-xstring is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806465" version="1" comment="texlive-xtab is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806466" version="1" comment="texlive-xunicode is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806467" version="1" comment="texlive-zapfchan is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806468" version="1" comment="texlive-zapfding is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806469" version="1" comment="texlive-zref is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806470" version="1" comment="libtiff is &lt;4.4.0-8.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806471" version="1" comment="libtiff-devel is &lt;4.4.0-8.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806472" version="1" comment="libtiff-tools is &lt;4.4.0-8.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806473" version="1" comment="postgresql is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806474" version="1" comment="postgresql-contrib is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806475" version="1" comment="postgresql-docs is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806476" version="1" comment="postgresql-plperl is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806477" version="1" comment="postgresql-plpython3 is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806478" version="1" comment="postgresql-pltcl is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806479" version="1" comment="postgresql-private-devel is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806480" version="1" comment="postgresql-private-libs is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806481" version="1" comment="postgresql-server is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806482" version="1" comment="postgresql-server-devel is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806483" version="1" comment="postgresql-static is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806484" version="1" comment="postgresql-test is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806485" version="1" comment="postgresql-upgrade is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806486" version="1" comment="postgresql-upgrade-devel is &lt;13.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806487" version="1" comment="libvirt is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806488" version="1" comment="libvirt-client is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806489" version="1" comment="libvirt-client-qemu is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806490" version="1" comment="libvirt-daemon is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806491" version="1" comment="libvirt-daemon-config-network is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806492" version="1" comment="libvirt-daemon-config-nwfilter is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806493" version="1" comment="libvirt-daemon-driver-interface is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806494" version="1" comment="libvirt-daemon-driver-network is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806495" version="1" comment="libvirt-daemon-driver-nodedev is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806496" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806497" version="1" comment="libvirt-daemon-driver-qemu is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806498" version="1" comment="libvirt-daemon-driver-secret is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806499" version="1" comment="libvirt-daemon-driver-storage is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806500" version="1" comment="libvirt-daemon-driver-storage-core is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806501" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806502" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806503" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806504" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806505" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806506" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806507" version="1" comment="libvirt-daemon-kvm is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806508" version="1" comment="libvirt-devel is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806509" version="1" comment="libvirt-docs is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806510" version="1" comment="libvirt-libs is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806511" version="1" comment="libvirt-lock-sanlock is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806512" version="1" comment="libvirt-nss is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806513" version="1" comment="openssl is &lt;3.0.7-16.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806514" version="1" comment="openssl-devel is &lt;3.0.7-16.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806515" version="1" comment="openssl-libs is &lt;3.0.7-16.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806516" version="1" comment="openssl-perl is &lt;3.0.7-16.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806517" version="1" comment="bpftool is &lt;7.0.0-284.18.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806518" version="1" comment="kernel is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806519" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-284.18.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806520" version="1" comment="kernel-core is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806521" version="1" comment="kernel-cross-headers is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806522" version="1" comment="kernel-debug is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806523" version="1" comment="kernel-debug-core is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806526" version="1" comment="kernel-debug-modules is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806527" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806528" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806529" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806532" version="1" comment="kernel-doc is &lt;5.14.0-284.18.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806533" version="1" comment="kernel-headers is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806534" version="1" comment="kernel-modules is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806535" version="1" comment="kernel-modules-core is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806536" version="1" comment="kernel-modules-extra is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806537" version="1" comment="kernel-tools is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806538" version="1" comment="kernel-tools-libs is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806540" version="1" comment="kernel-uki-virt is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806541" version="1" comment="perf is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806542" version="1" comment="python3-perf is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806543" version="1" comment="rtla is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806544" version="1" comment="less is &lt;590-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806545" version="1" comment="go-toolset is &lt;1.19.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806546" version="1" comment="golang is &lt;1.19.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806547" version="1" comment="golang-bin is &lt;1.19.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806548" version="1" comment="golang-docs is &lt;1.19.10-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806549" version="1" comment="golang-misc is &lt;1.19.10-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806550" version="1" comment="golang-race is &lt;1.19.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806551" version="1" comment="golang-src is &lt;1.19.10-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806552" version="1" comment="golang-tests is &lt;1.19.10-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806553" version="1" comment="grafana is &lt;9.0.9-3.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806554" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806555" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806556" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806557" version="1" comment="dotnet-host is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806558" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806559" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806560" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.109-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806561" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.109-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806562" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806563" version="1" comment="dotnet-templates-7.0 is &lt;7.0.109-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806564" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.109-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806565" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.20-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806566" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.20-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806567" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.20-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806568" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.20-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806569" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.20-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806570" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.120-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806571" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.120-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806572" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.20-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806573" version="1" comment="dotnet-templates-6.0 is &lt;6.0.120-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806574" version="1" comment="thunderbird is &lt;102.13.0-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806575" version="1" comment="firefox is &lt;102.13.0-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806576" version="1" comment="firefox-x11 is &lt;102.13.0-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806577" version="1" comment="bind is &lt;9.16.23-11.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806578" version="1" comment="bind-chroot is &lt;9.16.23-11.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806579" version="1" comment="bind-devel is &lt;9.16.23-11.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806580" version="1" comment="bind-dnssec-doc is &lt;9.16.23-11.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806581" version="1" comment="bind-dnssec-utils is &lt;9.16.23-11.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806582" version="1" comment="bind-doc is &lt;9.16.23-11.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806583" version="1" comment="bind-libs is &lt;9.16.23-11.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806584" version="1" comment="bind-license is &lt;9.16.23-11.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806585" version="1" comment="bind-utils is &lt;9.16.23-11.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806586" version="1" comment="python3-bind is &lt;9.16.23-11.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806587" version="1" comment="java-11-openjdk is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806588" version="1" comment="java-11-openjdk-demo is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806589" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806590" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806591" version="1" comment="java-11-openjdk-devel is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806592" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806593" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806594" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806595" version="1" comment="java-11-openjdk-headless is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806596" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806597" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806598" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806599" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806600" version="1" comment="java-11-openjdk-jmods is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806601" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806602" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806603" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806604" version="1" comment="java-11-openjdk-src is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806605" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806606" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806607" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806608" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806609" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806610" version="1" comment="java-17-openjdk is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806611" version="1" comment="java-17-openjdk-demo is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806612" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806613" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806614" version="1" comment="java-17-openjdk-devel is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806615" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806616" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806617" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806618" version="1" comment="java-17-openjdk-headless is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806619" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806620" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806621" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806622" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806623" version="1" comment="java-17-openjdk-jmods is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806624" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806625" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806626" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806627" version="1" comment="java-17-openjdk-src is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806628" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806629" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806630" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806631" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806632" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806633" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806634" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806635" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806636" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806637" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806638" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806639" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806640" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806641" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806642" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806643" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806644" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.382.b05-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806645" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.382.b05-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806646" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806647" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806648" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806649" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806650" version="1" comment="webkit2gtk3 is &lt;2.38.5-1.el9_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806651" version="1" comment="webkit2gtk3-devel is &lt;2.38.5-1.el9_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806652" version="1" comment="webkit2gtk3-jsc is &lt;2.38.5-1.el9_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806653" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.38.5-1.el9_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806654" version="1" comment="ctdb is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806655" version="1" comment="libnetapi is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806656" version="1" comment="libnetapi-devel is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806657" version="1" comment="libsmbclient is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806658" version="1" comment="libsmbclient-devel is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806659" version="1" comment="libwbclient is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806660" version="1" comment="libwbclient-devel is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806661" version="1" comment="python3-samba is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806662" version="1" comment="python3-samba-dc is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806663" version="1" comment="python3-samba-devel is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806664" version="1" comment="python3-samba-test is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806665" version="1" comment="samba is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806666" version="1" comment="samba-client is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806667" version="1" comment="samba-client-libs is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806668" version="1" comment="samba-common is &lt;4.17.5-103.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806669" version="1" comment="samba-common-libs is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806670" version="1" comment="samba-common-tools is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806671" version="1" comment="samba-dc-libs is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806672" version="1" comment="samba-dcerpc is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806673" version="1" comment="samba-devel is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806674" version="1" comment="samba-krb5-printing is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806675" version="1" comment="samba-ldb-ldap-modules is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806676" version="1" comment="samba-libs is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806677" version="1" comment="samba-pidl is &lt;4.17.5-103.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806678" version="1" comment="samba-test is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806679" version="1" comment="samba-test-libs is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806680" version="1" comment="samba-tools is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806681" version="1" comment="samba-usershares is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806682" version="1" comment="samba-vfs-iouring is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806683" version="1" comment="samba-winbind is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806684" version="1" comment="samba-winbind-clients is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806685" version="1" comment="samba-winbind-krb5-locator is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806686" version="1" comment="samba-winbind-modules is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806687" version="1" comment="samba-winexe is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806688" version="1" comment="pg_repack is &lt;1.4.8-1.module+el9.2.0+17405+aeb9ec60 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806689" version="1" comment="pgaudit is &lt;1.7.0-1.module+el9.2.0+17405+aeb9ec60 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806690" version="1" comment="postgres-decoderbufs is &lt;1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806691" version="1" comment="postgresql is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806692" version="1" comment="postgresql-contrib is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806693" version="1" comment="postgresql-docs is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806694" version="1" comment="postgresql-plperl is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806695" version="1" comment="postgresql-plpython3 is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806696" version="1" comment="postgresql-pltcl is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806697" version="1" comment="postgresql-private-devel is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806698" version="1" comment="postgresql-private-libs is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806699" version="1" comment="postgresql-server is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806700" version="1" comment="postgresql-server-devel is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806701" version="1" comment="postgresql-static is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806702" version="1" comment="postgresql-test is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806703" version="1" comment="postgresql-test-rpm-macros is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806704" version="1" comment="postgresql-upgrade is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806705" version="1" comment="postgresql-upgrade-devel is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806706" version="1" comment="nodejs is &lt;16.20.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806707" version="1" comment="nodejs-docs is &lt;16.20.1-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806708" version="1" comment="nodejs-full-i18n is &lt;16.20.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806709" version="1" comment="nodejs-libs is &lt;16.20.1-1.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806710" version="1" comment="npm is &lt;8.19.4-1.16.20.1.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806711" version="1" comment="libeconf is &lt;0.4.1-3.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806712" version="1" comment="libxml2 is &lt;2.9.13-3.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806713" version="1" comment="libxml2-devel is &lt;2.9.13-3.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806714" version="1" comment="python3-libxml2 is &lt;2.9.13-3.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806715" version="1" comment="python3-requests is &lt;2.25.1-7.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806716" version="1" comment="python3-requests+security is &lt;2.25.1-7.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806717" version="1" comment="python3-requests+socks is &lt;2.25.1-7.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806718" version="1" comment="curl is &lt;7.76.1-23.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806719" version="1" comment="curl-minimal is &lt;7.76.1-23.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806720" version="1" comment="libcurl is &lt;7.76.1-23.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806721" version="1" comment="libcurl-devel is &lt;7.76.1-23.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806722" version="1" comment="libcurl-minimal is &lt;7.76.1-23.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806723" version="1" comment="bpftool is &lt;7.0.0-284.25.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806724" version="1" comment="kernel is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806725" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-284.25.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806726" version="1" comment="kernel-core is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806727" version="1" comment="kernel-cross-headers is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806728" version="1" comment="kernel-debug is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806729" version="1" comment="kernel-debug-core is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806732" version="1" comment="kernel-debug-modules is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806733" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806734" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806735" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806738" version="1" comment="kernel-doc is &lt;5.14.0-284.25.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806739" version="1" comment="kernel-headers is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806740" version="1" comment="kernel-modules is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806741" version="1" comment="kernel-modules-core is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806742" version="1" comment="kernel-modules-extra is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806743" version="1" comment="kernel-tools is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806744" version="1" comment="kernel-tools-libs is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806746" version="1" comment="kernel-uki-virt is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806747" version="1" comment="perf is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806748" version="1" comment="python3-perf is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806749" version="1" comment="rtla is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806750" version="1" comment="cjose is &lt;0.6.1-13.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806751" version="1" comment="openssh is &lt;8.7p1-30.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806752" version="1" comment="openssh-clients is &lt;8.7p1-30.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806753" version="1" comment="openssh-keycat is &lt;8.7p1-30.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806754" version="1" comment="openssh-server is &lt;8.7p1-30.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806755" version="1" comment="firefox is &lt;102.14.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806756" version="1" comment="firefox-x11 is &lt;102.14.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806757" version="1" comment="thunderbird is &lt;102.14.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806758" version="1" comment="dbus is &lt;1.12.20-7.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806759" version="1" comment="dbus-common is &lt;1.12.20-7.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806760" version="1" comment="dbus-daemon is &lt;1.12.20-7.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806761" version="1" comment="dbus-devel is &lt;1.12.20-7.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806762" version="1" comment="dbus-libs is &lt;1.12.20-7.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806763" version="1" comment="dbus-tools is &lt;1.12.20-7.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806764" version="1" comment="dbus-x11 is &lt;1.12.20-7.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806765" version="1" comment="iperf3 is &lt;3.9-10.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806766" version="1" comment="cargo is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806767" version="1" comment="clippy is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806768" version="1" comment="rust is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806769" version="1" comment="rust-analysis is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806770" version="1" comment="rust-analyzer is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806771" version="1" comment="rust-debugger-common is &lt;1.66.1-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806772" version="1" comment="rust-doc is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806773" version="1" comment="rust-gdb is &lt;1.66.1-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806774" version="1" comment="rust-lldb is &lt;1.66.1-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806775" version="1" comment="rust-src is &lt;1.66.1-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806776" version="1" comment="rust-std-static is &lt;1.66.1-2.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806777" version="1" comment="rust-std-static-wasm32-unknown-unknown is &lt;1.66.1-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806778" version="1" comment="rust-std-static-wasm32-wasi is &lt;1.66.1-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806779" version="1" comment="rust-toolset is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806780" version="1" comment="rustfmt is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806781" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806782" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806783" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806784" version="1" comment="dotnet-host is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806785" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806786" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806787" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.110-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806788" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.110-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806789" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806790" version="1" comment="dotnet-templates-7.0 is &lt;7.0.110-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806791" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.110-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806792" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.21-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806793" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.21-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806794" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.21-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806795" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.21-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806796" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.21-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806797" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.121-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806798" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.121-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806799" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.21-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806800" version="1" comment="dotnet-templates-6.0 is &lt;6.0.121-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806801" version="1" comment="cups is &lt;2.3.3op2-16.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806802" version="1" comment="cups-client is &lt;2.3.3op2-16.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806803" version="1" comment="cups-devel is &lt;2.3.3op2-16.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806804" version="1" comment="cups-filesystem is &lt;2.3.3op2-16.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806805" version="1" comment="cups-ipptool is &lt;2.3.3op2-16.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806806" version="1" comment="cups-libs is &lt;2.3.3op2-16.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806807" version="1" comment="cups-lpd is &lt;2.3.3op2-16.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806808" version="1" comment="cups-printerapp is &lt;2.3.3op2-16.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806809" version="1" comment="thunderbird is &lt;102.15.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806810" version="1" comment="firefox is &lt;102.15.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806811" version="1" comment="firefox-x11 is &lt;102.15.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806812" version="1" comment="flac is &lt;1.3.3-10.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806813" version="1" comment="flac-devel is &lt;1.3.3-10.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806814" version="1" comment="flac-libs is &lt;1.3.3-10.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806815" version="1" comment="dmidecode is &lt;3.3-7.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806816" version="1" comment="bpftool is &lt;7.0.0-284.30.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806817" version="1" comment="kernel is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806818" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-284.30.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806819" version="1" comment="kernel-core is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806820" version="1" comment="kernel-cross-headers is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806821" version="1" comment="kernel-debug is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806822" version="1" comment="kernel-debug-core is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806825" version="1" comment="kernel-debug-modules is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806826" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806827" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806828" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806831" version="1" comment="kernel-doc is &lt;5.14.0-284.30.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806832" version="1" comment="kernel-headers is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806833" version="1" comment="kernel-modules is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806834" version="1" comment="kernel-modules-core is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806835" version="1" comment="kernel-modules-extra is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806836" version="1" comment="kernel-tools is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806837" version="1" comment="kernel-tools-libs is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806839" version="1" comment="kernel-uki-virt is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806840" version="1" comment="perf is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806841" version="1" comment="python3-perf is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806842" version="1" comment="rtla is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806843" version="1" comment="libcap is &lt;2.48-9.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806844" version="1" comment="libcap-devel is &lt;2.48-9.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806845" version="1" comment="keylime is &lt;6.5.2-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806846" version="1" comment="keylime-base is &lt;6.5.2-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806847" version="1" comment="keylime-registrar is &lt;6.5.2-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806848" version="1" comment="keylime-selinux is &lt;6.5.2-6.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806849" version="1" comment="keylime-tenant is &lt;6.5.2-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806850" version="1" comment="keylime-verifier is &lt;6.5.2-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806851" version="1" comment="python3-keylime is &lt;6.5.2-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806852" version="1" comment="librsvg2 is &lt;2.50.7-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806853" version="1" comment="librsvg2-devel is &lt;2.50.7-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806854" version="1" comment="librsvg2-tools is &lt;2.50.7-1.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806855" version="1" comment="qemu-guest-agent is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806856" version="1" comment="qemu-img is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806857" version="1" comment="qemu-kvm is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806858" version="1" comment="qemu-kvm-audio-pa is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806859" version="1" comment="qemu-kvm-block-curl is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806860" version="1" comment="qemu-kvm-block-rbd is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806861" version="1" comment="qemu-kvm-common is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806862" version="1" comment="qemu-kvm-core is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806863" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806864" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806865" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806866" version="1" comment="qemu-kvm-device-usb-host is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806867" version="1" comment="qemu-kvm-device-usb-redirect is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806868" version="1" comment="qemu-kvm-docs is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806869" version="1" comment="qemu-kvm-tools is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806870" version="1" comment="qemu-kvm-ui-egl-headless is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806871" version="1" comment="qemu-kvm-ui-opengl is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806872" version="1" comment="qemu-pr-helper is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806873" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806874" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806875" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806876" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806877" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806878" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.122-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806879" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.122-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806880" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806881" version="1" comment="dotnet-templates-6.0 is &lt;6.0.122-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806882" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806883" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806884" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806885" version="1" comment="dotnet-host is &lt;7.0.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806886" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806887" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806888" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.111-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806889" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.111-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806890" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.11-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806891" version="1" comment="dotnet-templates-7.0 is &lt;7.0.111-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806892" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.111-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806893" version="1" comment="frr is &lt;8.3.1-5.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806894" version="1" comment="frr-selinux is &lt;8.3.1-5.el9_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806895" version="1" comment="firefox is &lt;102.15.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806896" version="1" comment="firefox-x11 is &lt;102.15.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806897" version="1" comment="libwebp is &lt;1.2.0-7.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806898" version="1" comment="libwebp-devel is &lt;1.2.0-7.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806899" version="1" comment="libwebp-tools is &lt;1.2.0-7.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806900" version="1" comment="thunderbird is &lt;102.15.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806901" version="1" comment="open-vm-tools is &lt;12.1.5-1.el9_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806902" version="1" comment="open-vm-tools-desktop is &lt;12.1.5-1.el9_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806903" version="1" comment="open-vm-tools-salt-minion is &lt;12.1.5-1.el9_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806904" version="1" comment="open-vm-tools-sdmp is &lt;12.1.5-1.el9_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806905" version="1" comment="open-vm-tools-test is &lt;12.1.5-1.el9_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806906" version="1" comment="nodejs is &lt;18.17.1-1.module+el9.2.0.z+19753+58118bc0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806907" version="1" comment="nodejs-devel is &lt;18.17.1-1.module+el9.2.0.z+19753+58118bc0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806908" version="1" comment="nodejs-docs is &lt;18.17.1-1.module+el9.2.0.z+19753+58118bc0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806909" version="1" comment="nodejs-full-i18n is &lt;18.17.1-1.module+el9.2.0.z+19753+58118bc0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806910" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.2.0.z+19753+58118bc0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806911" version="1" comment="npm is &lt;9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806912" version="1" comment="firefox is &lt;115.3.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806913" version="1" comment="firefox-x11 is &lt;115.3.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806914" version="1" comment="thunderbird is &lt;115.3.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806915" version="1" comment="glibc is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806916" version="1" comment="glibc-all-langpacks is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806917" version="1" comment="glibc-benchtests is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806918" version="1" comment="glibc-common is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806919" version="1" comment="glibc-devel is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806920" version="1" comment="glibc-doc is &lt;2.34-60.el9_2.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806921" version="1" comment="glibc-gconv-extra is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806922" version="1" comment="glibc-headers is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806923" version="1" comment="glibc-langpack-aa is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806924" version="1" comment="glibc-langpack-af is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806925" version="1" comment="glibc-langpack-agr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806926" version="1" comment="glibc-langpack-ak is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806927" version="1" comment="glibc-langpack-am is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806928" version="1" comment="glibc-langpack-an is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806929" version="1" comment="glibc-langpack-anp is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806930" version="1" comment="glibc-langpack-ar is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806931" version="1" comment="glibc-langpack-as is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806932" version="1" comment="glibc-langpack-ast is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806933" version="1" comment="glibc-langpack-ayc is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806934" version="1" comment="glibc-langpack-az is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806935" version="1" comment="glibc-langpack-be is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806936" version="1" comment="glibc-langpack-bem is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806937" version="1" comment="glibc-langpack-ber is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806938" version="1" comment="glibc-langpack-bg is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806939" version="1" comment="glibc-langpack-bhb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806940" version="1" comment="glibc-langpack-bho is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806941" version="1" comment="glibc-langpack-bi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806942" version="1" comment="glibc-langpack-bn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806943" version="1" comment="glibc-langpack-bo is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806944" version="1" comment="glibc-langpack-br is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806945" version="1" comment="glibc-langpack-brx is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806946" version="1" comment="glibc-langpack-bs is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806947" version="1" comment="glibc-langpack-byn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806948" version="1" comment="glibc-langpack-ca is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806949" version="1" comment="glibc-langpack-ce is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806950" version="1" comment="glibc-langpack-chr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806951" version="1" comment="glibc-langpack-ckb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806952" version="1" comment="glibc-langpack-cmn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806953" version="1" comment="glibc-langpack-crh is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806954" version="1" comment="glibc-langpack-cs is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806955" version="1" comment="glibc-langpack-csb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806956" version="1" comment="glibc-langpack-cv is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806957" version="1" comment="glibc-langpack-cy is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806958" version="1" comment="glibc-langpack-da is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806959" version="1" comment="glibc-langpack-de is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806960" version="1" comment="glibc-langpack-doi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806961" version="1" comment="glibc-langpack-dsb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806962" version="1" comment="glibc-langpack-dv is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806963" version="1" comment="glibc-langpack-dz is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806964" version="1" comment="glibc-langpack-el is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806965" version="1" comment="glibc-langpack-en is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806966" version="1" comment="glibc-langpack-eo is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806967" version="1" comment="glibc-langpack-es is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806968" version="1" comment="glibc-langpack-et is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806969" version="1" comment="glibc-langpack-eu is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806970" version="1" comment="glibc-langpack-fa is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806971" version="1" comment="glibc-langpack-ff is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806972" version="1" comment="glibc-langpack-fi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806973" version="1" comment="glibc-langpack-fil is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806974" version="1" comment="glibc-langpack-fo is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806975" version="1" comment="glibc-langpack-fr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806976" version="1" comment="glibc-langpack-fur is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806977" version="1" comment="glibc-langpack-fy is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806978" version="1" comment="glibc-langpack-ga is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806979" version="1" comment="glibc-langpack-gd is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806980" version="1" comment="glibc-langpack-gez is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806981" version="1" comment="glibc-langpack-gl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806982" version="1" comment="glibc-langpack-gu is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806983" version="1" comment="glibc-langpack-gv is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806984" version="1" comment="glibc-langpack-ha is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806985" version="1" comment="glibc-langpack-hak is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806986" version="1" comment="glibc-langpack-he is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806987" version="1" comment="glibc-langpack-hi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806988" version="1" comment="glibc-langpack-hif is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806989" version="1" comment="glibc-langpack-hne is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806990" version="1" comment="glibc-langpack-hr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806991" version="1" comment="glibc-langpack-hsb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806992" version="1" comment="glibc-langpack-ht is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806993" version="1" comment="glibc-langpack-hu is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806994" version="1" comment="glibc-langpack-hy is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806995" version="1" comment="glibc-langpack-ia is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806996" version="1" comment="glibc-langpack-id is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806997" version="1" comment="glibc-langpack-ig is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806998" version="1" comment="glibc-langpack-ik is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806999" version="1" comment="glibc-langpack-is is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807000" version="1" comment="glibc-langpack-it is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807001" version="1" comment="glibc-langpack-iu is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807002" version="1" comment="glibc-langpack-ja is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807003" version="1" comment="glibc-langpack-ka is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807004" version="1" comment="glibc-langpack-kab is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807005" version="1" comment="glibc-langpack-kk is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807006" version="1" comment="glibc-langpack-kl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807007" version="1" comment="glibc-langpack-km is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807008" version="1" comment="glibc-langpack-kn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807009" version="1" comment="glibc-langpack-ko is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807010" version="1" comment="glibc-langpack-kok is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807011" version="1" comment="glibc-langpack-ks is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807012" version="1" comment="glibc-langpack-ku is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807013" version="1" comment="glibc-langpack-kw is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807014" version="1" comment="glibc-langpack-ky is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807015" version="1" comment="glibc-langpack-lb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807016" version="1" comment="glibc-langpack-lg is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807017" version="1" comment="glibc-langpack-li is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807018" version="1" comment="glibc-langpack-lij is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807019" version="1" comment="glibc-langpack-ln is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807020" version="1" comment="glibc-langpack-lo is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807021" version="1" comment="glibc-langpack-lt is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807022" version="1" comment="glibc-langpack-lv is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807023" version="1" comment="glibc-langpack-lzh is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807024" version="1" comment="glibc-langpack-mag is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807025" version="1" comment="glibc-langpack-mai is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807026" version="1" comment="glibc-langpack-mfe is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807027" version="1" comment="glibc-langpack-mg is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807028" version="1" comment="glibc-langpack-mhr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807029" version="1" comment="glibc-langpack-mi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807030" version="1" comment="glibc-langpack-miq is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807031" version="1" comment="glibc-langpack-mjw is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807032" version="1" comment="glibc-langpack-mk is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807033" version="1" comment="glibc-langpack-ml is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807034" version="1" comment="glibc-langpack-mn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807035" version="1" comment="glibc-langpack-mni is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807036" version="1" comment="glibc-langpack-mnw is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807037" version="1" comment="glibc-langpack-mr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807038" version="1" comment="glibc-langpack-ms is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807039" version="1" comment="glibc-langpack-mt is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807040" version="1" comment="glibc-langpack-my is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807041" version="1" comment="glibc-langpack-nan is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807042" version="1" comment="glibc-langpack-nb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807043" version="1" comment="glibc-langpack-nds is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807044" version="1" comment="glibc-langpack-ne is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807045" version="1" comment="glibc-langpack-nhn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807046" version="1" comment="glibc-langpack-niu is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807047" version="1" comment="glibc-langpack-nl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807048" version="1" comment="glibc-langpack-nn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807049" version="1" comment="glibc-langpack-nr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807050" version="1" comment="glibc-langpack-nso is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807051" version="1" comment="glibc-langpack-oc is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807052" version="1" comment="glibc-langpack-om is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807053" version="1" comment="glibc-langpack-or is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807054" version="1" comment="glibc-langpack-os is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807055" version="1" comment="glibc-langpack-pa is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807056" version="1" comment="glibc-langpack-pap is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807057" version="1" comment="glibc-langpack-pl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807058" version="1" comment="glibc-langpack-ps is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807059" version="1" comment="glibc-langpack-pt is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807060" version="1" comment="glibc-langpack-quz is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807061" version="1" comment="glibc-langpack-raj is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807062" version="1" comment="glibc-langpack-ro is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807063" version="1" comment="glibc-langpack-ru is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807064" version="1" comment="glibc-langpack-rw is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807065" version="1" comment="glibc-langpack-sa is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807066" version="1" comment="glibc-langpack-sah is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807067" version="1" comment="glibc-langpack-sat is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807068" version="1" comment="glibc-langpack-sc is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807069" version="1" comment="glibc-langpack-sd is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807070" version="1" comment="glibc-langpack-se is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807071" version="1" comment="glibc-langpack-sgs is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807072" version="1" comment="glibc-langpack-shn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807073" version="1" comment="glibc-langpack-shs is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807074" version="1" comment="glibc-langpack-si is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807075" version="1" comment="glibc-langpack-sid is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807076" version="1" comment="glibc-langpack-sk is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807077" version="1" comment="glibc-langpack-sl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807078" version="1" comment="glibc-langpack-sm is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807079" version="1" comment="glibc-langpack-so is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807080" version="1" comment="glibc-langpack-sq is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807081" version="1" comment="glibc-langpack-sr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807082" version="1" comment="glibc-langpack-ss is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807083" version="1" comment="glibc-langpack-st is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807084" version="1" comment="glibc-langpack-sv is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807085" version="1" comment="glibc-langpack-sw is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807086" version="1" comment="glibc-langpack-szl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807087" version="1" comment="glibc-langpack-ta is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807088" version="1" comment="glibc-langpack-tcy is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807089" version="1" comment="glibc-langpack-te is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807090" version="1" comment="glibc-langpack-tg is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807091" version="1" comment="glibc-langpack-th is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807092" version="1" comment="glibc-langpack-the is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807093" version="1" comment="glibc-langpack-ti is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807094" version="1" comment="glibc-langpack-tig is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807095" version="1" comment="glibc-langpack-tk is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807096" version="1" comment="glibc-langpack-tl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807097" version="1" comment="glibc-langpack-tn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807098" version="1" comment="glibc-langpack-to is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807099" version="1" comment="glibc-langpack-tpi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807100" version="1" comment="glibc-langpack-tr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807101" version="1" comment="glibc-langpack-ts is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807102" version="1" comment="glibc-langpack-tt is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807103" version="1" comment="glibc-langpack-ug is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807104" version="1" comment="glibc-langpack-uk is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807105" version="1" comment="glibc-langpack-unm is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807106" version="1" comment="glibc-langpack-ur is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807107" version="1" comment="glibc-langpack-uz is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807108" version="1" comment="glibc-langpack-ve is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807109" version="1" comment="glibc-langpack-vi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807110" version="1" comment="glibc-langpack-wa is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807111" version="1" comment="glibc-langpack-wae is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807112" version="1" comment="glibc-langpack-wal is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807113" version="1" comment="glibc-langpack-wo is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807114" version="1" comment="glibc-langpack-xh is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807115" version="1" comment="glibc-langpack-yi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807116" version="1" comment="glibc-langpack-yo is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807117" version="1" comment="glibc-langpack-yue is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807118" version="1" comment="glibc-langpack-yuw is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807119" version="1" comment="glibc-langpack-zh is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807120" version="1" comment="glibc-langpack-zu is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807121" version="1" comment="glibc-locale-source is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807122" version="1" comment="glibc-minimal-langpack is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807123" version="1" comment="glibc-nss-devel is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807124" version="1" comment="glibc-static is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807125" version="1" comment="glibc-utils is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807126" version="1" comment="libnsl is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807127" version="1" comment="nscd is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807128" version="1" comment="nss_db is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807129" version="1" comment="nss_hesiod is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807130" version="1" comment="python3.11 is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807131" version="1" comment="python3.11-debug is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807132" version="1" comment="python3.11-devel is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807133" version="1" comment="python3.11-idle is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807134" version="1" comment="python3.11-libs is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807135" version="1" comment="python3.11-test is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807136" version="1" comment="python3.11-tkinter is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807137" version="1" comment="ghostscript is &lt;9.54.0-10.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807138" version="1" comment="ghostscript-doc is &lt;9.54.0-10.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807139" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-10.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807140" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-10.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807141" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-10.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807142" version="1" comment="ghostscript-x11 is &lt;9.54.0-10.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807143" version="1" comment="libgs is &lt;9.54.0-10.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807144" version="1" comment="libgs-devel is &lt;9.54.0-10.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807145" version="1" comment="python-unversioned-command is &lt;3.9.16-1.el9_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807146" version="1" comment="python3 is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807147" version="1" comment="python3-debug is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807148" version="1" comment="python3-devel is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807149" version="1" comment="python3-idle is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807150" version="1" comment="python3-libs is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807151" version="1" comment="python3-test is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807152" version="1" comment="python3-tkinter is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807153" version="1" comment="nodejs is &lt;16.20.2-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807154" version="1" comment="nodejs-docs is &lt;16.20.2-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807155" version="1" comment="nodejs-full-i18n is &lt;16.20.2-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807156" version="1" comment="nodejs-libs is &lt;16.20.2-1.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807157" version="1" comment="npm is &lt;8.19.4-1.16.20.2.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807158" version="1" comment="libvpx is &lt;1.9.0-7.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807159" version="1" comment="libvpx-devel is &lt;1.9.0-7.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807680" version="1" comment="galera is &lt;26.4.14-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807681" version="1" comment="mariadb is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807682" version="1" comment="mariadb-backup is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807683" version="1" comment="mariadb-common is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807684" version="1" comment="mariadb-devel is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807685" version="1" comment="mariadb-embedded is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807686" version="1" comment="mariadb-embedded-devel is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807687" version="1" comment="mariadb-errmsg is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807688" version="1" comment="mariadb-gssapi-server is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807689" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807690" version="1" comment="mariadb-pam is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807691" version="1" comment="mariadb-server is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807692" version="1" comment="mariadb-server-galera is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807693" version="1" comment="mariadb-server-utils is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807694" version="1" comment="mariadb-test is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807160" version="1" comment="bind is &lt;9.16.23-11.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807161" version="1" comment="bind-chroot is &lt;9.16.23-11.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807162" version="1" comment="bind-devel is &lt;9.16.23-11.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807163" version="1" comment="bind-dnssec-doc is &lt;9.16.23-11.el9_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807164" version="1" comment="bind-dnssec-utils is &lt;9.16.23-11.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807165" version="1" comment="bind-doc is &lt;9.16.23-11.el9_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807166" version="1" comment="bind-libs is &lt;9.16.23-11.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807167" version="1" comment="bind-license is &lt;9.16.23-11.el9_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807168" version="1" comment="bind-utils is &lt;9.16.23-11.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807169" version="1" comment="python3-bind is &lt;9.16.23-11.el9_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807170" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.23-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807171" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.23-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807172" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.23-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807173" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.23-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807174" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.23-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807175" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.123-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807176" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.123-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807177" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.23-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807178" version="1" comment="dotnet-templates-6.0 is &lt;6.0.123-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807179" version="1" comment="nginx is &lt;1.20.1-14.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807180" version="1" comment="nginx-all-modules is &lt;1.20.1-14.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807181" version="1" comment="nginx-core is &lt;1.20.1-14.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807182" version="1" comment="nginx-filesystem is &lt;1.20.1-14.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807183" version="1" comment="nginx-mod-devel is &lt;1.20.1-14.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807184" version="1" comment="nginx-mod-http-image-filter is &lt;1.20.1-14.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807185" version="1" comment="nginx-mod-http-perl is &lt;1.20.1-14.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807186" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.20.1-14.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807187" version="1" comment="nginx-mod-mail is &lt;1.20.1-14.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807188" version="1" comment="nginx-mod-stream is &lt;1.20.1-14.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807189" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807190" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807191" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807192" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807193" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807194" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807195" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807196" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807197" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807198" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807199" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807200" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.392.b08-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807201" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.392.b08-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807202" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807203" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807204" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807205" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807206" version="1" comment="go-toolset is &lt;1.19.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807207" version="1" comment="golang is &lt;1.19.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807208" version="1" comment="golang-bin is &lt;1.19.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807209" version="1" comment="golang-docs is &lt;1.19.13-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807210" version="1" comment="golang-misc is &lt;1.19.13-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807211" version="1" comment="golang-race is &lt;1.19.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807212" version="1" comment="golang-src is &lt;1.19.13-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807213" version="1" comment="golang-tests is &lt;1.19.13-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807214" version="1" comment="java-11-openjdk is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807215" version="1" comment="java-11-openjdk-demo is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807216" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807217" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807218" version="1" comment="java-11-openjdk-devel is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807219" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807220" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807221" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807222" version="1" comment="java-11-openjdk-headless is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807223" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807224" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807225" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807226" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807227" version="1" comment="java-11-openjdk-jmods is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807228" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807229" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807230" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807231" version="1" comment="java-11-openjdk-src is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807232" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807233" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807234" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807235" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807236" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807237" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.12-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807238" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.12-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807239" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.12-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807240" version="1" comment="dotnet-host is &lt;7.0.12-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807241" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.12-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807242" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.12-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807243" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.112-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807244" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.112-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807245" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.12-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807246" version="1" comment="dotnet-templates-7.0 is &lt;7.0.112-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807247" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.112-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807248" version="1" comment="java-17-openjdk is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807249" version="1" comment="java-17-openjdk-demo is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807250" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807251" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807252" version="1" comment="java-17-openjdk-devel is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807253" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807254" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807255" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807256" version="1" comment="java-17-openjdk-headless is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807257" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807258" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807259" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807260" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807261" version="1" comment="java-17-openjdk-jmods is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807262" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807263" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807264" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807265" version="1" comment="java-17-openjdk-src is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807266" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807267" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807268" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807269" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807270" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807271" version="1" comment="curl is &lt;7.76.1-23.el9_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807272" version="1" comment="curl-minimal is &lt;7.76.1-23.el9_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807273" version="1" comment="libcurl is &lt;7.76.1-23.el9_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807274" version="1" comment="libcurl-devel is &lt;7.76.1-23.el9_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807275" version="1" comment="libcurl-minimal is &lt;7.76.1-23.el9_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807276" version="1" comment="nodejs is &lt;16.20.2-3.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807277" version="1" comment="nodejs-docs is &lt;16.20.2-3.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807278" version="1" comment="nodejs-full-i18n is &lt;16.20.2-3.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807279" version="1" comment="nodejs-libs is &lt;16.20.2-3.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807280" version="1" comment="npm is &lt;8.19.4-1.16.20.2.3.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807281" version="1" comment="libnghttp2 is &lt;1.43.0-5.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807282" version="1" comment="libnghttp2-devel is &lt;1.43.0-5.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807283" version="1" comment="nghttp2 is &lt;1.43.0-5.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807284" version="1" comment="nodejs is &lt;18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807285" version="1" comment="nodejs-devel is &lt;18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807286" version="1" comment="nodejs-docs is &lt;18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807287" version="1" comment="nodejs-full-i18n is &lt;18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807288" version="1" comment="npm is &lt;9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807289" version="1" comment="grafana is &lt;9.0.9-4.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807290" version="1" comment="varnish is &lt;6.6.2-3.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807291" version="1" comment="varnish-devel is &lt;6.6.2-3.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807292" version="1" comment="varnish-docs is &lt;6.6.2-3.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807293" version="1" comment="php is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807294" version="1" comment="php-bcmath is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807295" version="1" comment="php-cli is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807296" version="1" comment="php-common is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807297" version="1" comment="php-dba is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807298" version="1" comment="php-dbg is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807299" version="1" comment="php-devel is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807300" version="1" comment="php-embedded is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807301" version="1" comment="php-enchant is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807302" version="1" comment="php-ffi is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807303" version="1" comment="php-fpm is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807304" version="1" comment="php-gd is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807305" version="1" comment="php-gmp is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807306" version="1" comment="php-intl is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807307" version="1" comment="php-ldap is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807308" version="1" comment="php-mbstring is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807309" version="1" comment="php-mysqlnd is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807310" version="1" comment="php-odbc is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807311" version="1" comment="php-opcache is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807312" version="1" comment="php-pdo is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807313" version="1" comment="php-pgsql is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807314" version="1" comment="php-process is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807315" version="1" comment="php-snmp is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807316" version="1" comment="php-soap is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807317" version="1" comment="php-xml is &lt;8.0.30-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807318" version="1" comment="tomcat is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807319" version="1" comment="tomcat-admin-webapps is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807320" version="1" comment="tomcat-docs-webapp is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807321" version="1" comment="tomcat-el-3.0-api is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807322" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807323" version="1" comment="tomcat-lib is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807324" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807325" version="1" comment="tomcat-webapps is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807326" version="1" comment="nginx is &lt;1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807327" version="1" comment="nginx-all-modules is &lt;1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807328" version="1" comment="nginx-core is &lt;1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807329" version="1" comment="nginx-filesystem is &lt;1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807330" version="1" comment="nginx-mod-devel is &lt;1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807331" version="1" comment="nginx-mod-http-image-filter is &lt;1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807332" version="1" comment="nginx-mod-http-perl is &lt;1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807333" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807334" version="1" comment="nginx-mod-mail is &lt;1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807335" version="1" comment="nginx-mod-stream is &lt;1.22.1-3.module+el9.2.0.z+20353+5a828d50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811012" version="1" comment="libguestfs-winsupport is &lt;9.2-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808826" version="1" comment="firefox is &lt;115.4.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808827" version="1" comment="firefox-x11 is &lt;115.4.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809033" version="1" comment="thunderbird is &lt;115.4.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808828" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.24-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808829" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.24-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808830" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.24-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808831" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.24-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808832" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.24-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808833" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.124-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808834" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.124-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808835" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.24-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808836" version="1" comment="dotnet-templates-6.0 is &lt;6.0.124-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808837" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808838" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808839" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808840" version="1" comment="dotnet-host is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808841" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808842" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808843" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.113-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808844" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.113-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808845" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808846" version="1" comment="dotnet-templates-7.0 is &lt;7.0.113-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808847" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.113-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809000" version="1" comment="ghostscript is &lt;9.54.0-11.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809001" version="1" comment="ghostscript-doc is &lt;9.54.0-11.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809002" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-11.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809003" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-11.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809004" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-11.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809005" version="1" comment="ghostscript-x11 is &lt;9.54.0-11.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809006" version="1" comment="libgs is &lt;9.54.0-11.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809007" version="1" comment="libgs-devel is &lt;9.54.0-11.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809008" version="1" comment="squid is &lt;5.5-5.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813701" version="1" comment="pcs is &lt;0.11.6-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813702" version="1" comment="pcs-snmp is &lt;0.11.6-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810780" version="1" comment="python3.11-pip is &lt;22.3.1-4.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810781" version="1" comment="python3.11-pip-wheel is &lt;22.3.1-4.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811013" version="1" comment="edk2-ovmf is &lt;20230524-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811014" version="1" comment="edk2-tools is &lt;20230524-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811015" version="1" comment="edk2-tools-doc is &lt;20230524-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811016" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811017" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811018" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811019" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811020" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811021" version="1" comment="xorg-x11-server-common is &lt;1.20.11-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811022" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-19.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811023" version="1" comment="xorg-x11-server-source is &lt;1.20.11-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810782" version="1" comment="xorg-x11-server-Xwayland is &lt;22.1.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810783" version="1" comment="LibRaw is &lt;0.20.2-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810784" version="1" comment="LibRaw-devel is &lt;0.20.2-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811024" version="1" comment="skopeo is &lt;1.13.3-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811025" version="1" comment="skopeo-tests is &lt;1.13.3-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811026" version="1" comment="mod_auth_openidc is &lt;2.4.9.4-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813867" version="1" comment="adwaita-qt5 is &lt;1.4.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813868" version="1" comment="libadwaita-qt5 is &lt;1.4.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813869" version="1" comment="python-qt5-rpm-macros is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813870" version="1" comment="python3-pyqt5-sip is &lt;12.11.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813871" version="1" comment="python3-qt5 is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813872" version="1" comment="python3-qt5-base is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813873" version="1" comment="python3-qt5-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813874" version="1" comment="qgnomeplatform is &lt;0.9.0-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813875" version="1" comment="qt5 is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813876" version="1" comment="qt5-assistant is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813877" version="1" comment="qt5-designer is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813878" version="1" comment="qt5-devel is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813879" version="1" comment="qt5-doctools is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813880" version="1" comment="qt5-linguist is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813881" version="1" comment="qt5-qdbusviewer is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813882" version="1" comment="qt5-qt3d is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813883" version="1" comment="qt5-qt3d-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813884" version="1" comment="qt5-qt3d-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813885" version="1" comment="qt5-qt3d-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813886" version="1" comment="qt5-qtbase is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813887" version="1" comment="qt5-qtbase-common is &lt;5.15.9-7.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813888" version="1" comment="qt5-qtbase-devel is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813889" version="1" comment="qt5-qtbase-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813890" version="1" comment="qt5-qtbase-examples is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813891" version="1" comment="qt5-qtbase-gui is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813892" version="1" comment="qt5-qtbase-mysql is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813893" version="1" comment="qt5-qtbase-odbc is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813894" version="1" comment="qt5-qtbase-postgresql is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813895" version="1" comment="qt5-qtbase-private-devel is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813896" version="1" comment="qt5-qtbase-static is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813897" version="1" comment="qt5-qtconnectivity is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813898" version="1" comment="qt5-qtconnectivity-devel is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813899" version="1" comment="qt5-qtconnectivity-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813900" version="1" comment="qt5-qtconnectivity-examples is &lt;5.15.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813901" version="1" comment="qt5-qtdeclarative is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813902" version="1" comment="qt5-qtdeclarative-devel is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813903" version="1" comment="qt5-qtdeclarative-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813904" version="1" comment="qt5-qtdeclarative-examples is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813905" version="1" comment="qt5-qtdeclarative-static is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813906" version="1" comment="qt5-qtdoc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813907" version="1" comment="qt5-qtgraphicaleffects is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813908" version="1" comment="qt5-qtgraphicaleffects-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813909" version="1" comment="qt5-qtimageformats is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813910" version="1" comment="qt5-qtimageformats-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813911" version="1" comment="qt5-qtlocation is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813912" version="1" comment="qt5-qtlocation-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813913" version="1" comment="qt5-qtlocation-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813914" version="1" comment="qt5-qtlocation-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813915" version="1" comment="qt5-qtmultimedia is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813916" version="1" comment="qt5-qtmultimedia-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813917" version="1" comment="qt5-qtmultimedia-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813918" version="1" comment="qt5-qtmultimedia-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813919" version="1" comment="qt5-qtquickcontrols is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813920" version="1" comment="qt5-qtquickcontrols-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813921" version="1" comment="qt5-qtquickcontrols-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813922" version="1" comment="qt5-qtquickcontrols2 is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813923" version="1" comment="qt5-qtquickcontrols2-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813924" version="1" comment="qt5-qtquickcontrols2-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813925" version="1" comment="qt5-qtquickcontrols2-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813926" version="1" comment="qt5-qtscript is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813927" version="1" comment="qt5-qtscript-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813928" version="1" comment="qt5-qtscript-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813929" version="1" comment="qt5-qtscript-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813930" version="1" comment="qt5-qtsensors is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813931" version="1" comment="qt5-qtsensors-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813932" version="1" comment="qt5-qtsensors-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813933" version="1" comment="qt5-qtsensors-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813934" version="1" comment="qt5-qtserialbus is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813935" version="1" comment="qt5-qtserialbus-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813936" version="1" comment="qt5-qtserialbus-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813937" version="1" comment="qt5-qtserialbus-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813938" version="1" comment="qt5-qtserialport is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813939" version="1" comment="qt5-qtserialport-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813940" version="1" comment="qt5-qtserialport-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813941" version="1" comment="qt5-qtserialport-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813942" version="1" comment="qt5-qtsvg is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813943" version="1" comment="qt5-qtsvg-devel is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813944" version="1" comment="qt5-qtsvg-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813945" version="1" comment="qt5-qtsvg-examples is &lt;5.15.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813946" version="1" comment="qt5-qttools is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813947" version="1" comment="qt5-qttools-common is &lt;5.15.9-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813948" version="1" comment="qt5-qttools-devel is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813949" version="1" comment="qt5-qttools-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813950" version="1" comment="qt5-qttools-examples is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813951" version="1" comment="qt5-qttools-libs-designer is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813952" version="1" comment="qt5-qttools-libs-designercomponents is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813953" version="1" comment="qt5-qttools-libs-help is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813954" version="1" comment="qt5-qttools-static is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813955" version="1" comment="qt5-qttranslations is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813956" version="1" comment="qt5-qtwayland is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813957" version="1" comment="qt5-qtwayland-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813958" version="1" comment="qt5-qtwayland-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813959" version="1" comment="qt5-qtwayland-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813960" version="1" comment="qt5-qtwebchannel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813961" version="1" comment="qt5-qtwebchannel-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813962" version="1" comment="qt5-qtwebchannel-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813963" version="1" comment="qt5-qtwebchannel-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813964" version="1" comment="qt5-qtwebsockets is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813965" version="1" comment="qt5-qtwebsockets-devel is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813966" version="1" comment="qt5-qtwebsockets-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813967" version="1" comment="qt5-qtwebsockets-examples is &lt;5.15.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813968" version="1" comment="qt5-qtx11extras is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813969" version="1" comment="qt5-qtx11extras-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813970" version="1" comment="qt5-qtx11extras-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813971" version="1" comment="qt5-qtxmlpatterns is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813972" version="1" comment="qt5-qtxmlpatterns-devel is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813973" version="1" comment="qt5-qtxmlpatterns-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813974" version="1" comment="qt5-qtxmlpatterns-examples is &lt;5.15.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813975" version="1" comment="qt5-rpm-macros is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813976" version="1" comment="qt5-srpm-macros is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813703" version="1" comment="cloud-init is &lt;23.1.1-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810785" version="1" comment="gdb is &lt;10.2-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810786" version="1" comment="gdb-doc is &lt;10.2-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810787" version="1" comment="gdb-gdbserver is &lt;10.2-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810788" version="1" comment="gdb-headless is &lt;10.2-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810789" version="1" comment="gdb-minimal is &lt;10.2-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810790" version="1" comment="runc is &lt;1.1.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811027" version="1" comment="liblouis is &lt;3.16.1-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811028" version="1" comment="python3-louis is &lt;3.16.1-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811029" version="1" comment="containernetworking-plugins is &lt;1.3.0-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811030" version="1" comment="httpd is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811031" version="1" comment="httpd-core is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811032" version="1" comment="httpd-devel is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811033" version="1" comment="httpd-filesystem is &lt;2.4.57-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811034" version="1" comment="httpd-manual is &lt;2.4.57-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811035" version="1" comment="httpd-tools is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811036" version="1" comment="mod_http2 is &lt;1.15.19-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811037" version="1" comment="mod_ldap is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811038" version="1" comment="mod_lua is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811039" version="1" comment="mod_proxy_html is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811040" version="1" comment="mod_session is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811041" version="1" comment="mod_ssl is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811042" version="1" comment="libvirt is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811043" version="1" comment="libvirt-client is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811044" version="1" comment="libvirt-client-qemu is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811045" version="1" comment="libvirt-daemon is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811046" version="1" comment="libvirt-daemon-common is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811047" version="1" comment="libvirt-daemon-config-network is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811048" version="1" comment="libvirt-daemon-config-nwfilter is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811049" version="1" comment="libvirt-daemon-driver-interface is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811050" version="1" comment="libvirt-daemon-driver-network is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811051" version="1" comment="libvirt-daemon-driver-nodedev is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811052" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811053" version="1" comment="libvirt-daemon-driver-qemu is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811054" version="1" comment="libvirt-daemon-driver-secret is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811055" version="1" comment="libvirt-daemon-driver-storage is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811056" version="1" comment="libvirt-daemon-driver-storage-core is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811057" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811058" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811059" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811060" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811061" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811062" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811063" version="1" comment="libvirt-daemon-kvm is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811064" version="1" comment="libvirt-daemon-lock is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811065" version="1" comment="libvirt-daemon-log is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811066" version="1" comment="libvirt-daemon-plugin-lockd is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811067" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811068" version="1" comment="libvirt-daemon-proxy is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811069" version="1" comment="libvirt-devel is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811070" version="1" comment="libvirt-docs is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811071" version="1" comment="libvirt-libs is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811072" version="1" comment="libvirt-nss is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813704" version="1" comment="grafana is &lt;9.2.10-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811073" version="1" comment="libpq is &lt;13.11-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811074" version="1" comment="libpq-devel is &lt;13.11-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810791" version="1" comment="libfastjson is &lt;0.99.9-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810792" version="1" comment="libfastjson-devel is &lt;0.99.9-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811075" version="1" comment="frr is &lt;8.3.1-11.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811076" version="1" comment="frr-selinux is &lt;8.3.1-11.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811077" version="1" comment="wireshark is &lt;3.4.10-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811078" version="1" comment="wireshark-cli is &lt;3.4.10-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811079" version="1" comment="wireshark-devel is &lt;3.4.10-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811080" version="1" comment="buildah is &lt;1.31.3-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811081" version="1" comment="buildah-tests is &lt;1.31.3-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810793" version="1" comment="podman is &lt;4.6.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810794" version="1" comment="podman-docker is &lt;4.6.1-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810795" version="1" comment="podman-gvproxy is &lt;4.6.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810796" version="1" comment="podman-plugins is &lt;4.6.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810797" version="1" comment="podman-remote is &lt;4.6.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810798" version="1" comment="podman-tests is &lt;4.6.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810799" version="1" comment="librabbitmq is &lt;0.11.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810800" version="1" comment="librabbitmq-devel is &lt;0.11.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810801" version="1" comment="librabbitmq-tools is &lt;0.11.0-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811082" version="1" comment="tang is &lt;14-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811083" version="1" comment="python3.11 is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811084" version="1" comment="python3.11-debug is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811085" version="1" comment="python3.11-devel is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811086" version="1" comment="python3.11-idle is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811087" version="1" comment="python3.11-libs is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811088" version="1" comment="python3.11-test is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811089" version="1" comment="python3.11-tkinter is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811090" version="1" comment="haproxy is &lt;2.4.22-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811091" version="1" comment="libX11 is &lt;1.7.0-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811092" version="1" comment="libX11-common is &lt;1.7.0-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811093" version="1" comment="libX11-devel is &lt;1.7.0-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811094" version="1" comment="libX11-xcb is &lt;1.7.0-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811095" version="1" comment="flatpak is &lt;1.12.8-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811096" version="1" comment="flatpak-devel is &lt;1.12.8-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811097" version="1" comment="flatpak-libs is &lt;1.12.8-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811098" version="1" comment="flatpak-selinux is &lt;1.12.8-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811099" version="1" comment="flatpak-session-helper is &lt;1.12.8-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811100" version="1" comment="python3-tornado is &lt;6.1.0-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811101" version="1" comment="dnsmasq is &lt;2.85-14.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811102" version="1" comment="dnsmasq-utils is &lt;2.85-14.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811103" version="1" comment="webkit2gtk3 is &lt;2.40.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811104" version="1" comment="webkit2gtk3-devel is &lt;2.40.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811105" version="1" comment="webkit2gtk3-jsc is &lt;2.40.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811106" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.40.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811107" version="1" comment="perl-CPAN is &lt;2.29-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811108" version="1" comment="perl-HTTP-Tiny is &lt;0.076-461.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811109" version="1" comment="ghostscript is &lt;9.54.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811110" version="1" comment="ghostscript-doc is &lt;9.54.0-13.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811111" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811112" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811113" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811114" version="1" comment="ghostscript-x11 is &lt;9.54.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811115" version="1" comment="libgs is &lt;9.54.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811116" version="1" comment="libgs-devel is &lt;9.54.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811117" version="1" comment="libreswan is &lt;4.12-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811118" version="1" comment="yajl is &lt;2.1.0-22.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811119" version="1" comment="yajl-devel is &lt;2.1.0-22.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813977" version="1" comment="libmicrohttpd is &lt;0.9.72-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813978" version="1" comment="libmicrohttpd-devel is &lt;0.9.72-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813979" version="1" comment="libmicrohttpd-doc is &lt;0.9.72-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811120" version="1" comment="sysstat is &lt;12.5.4-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811121" version="1" comment="tomcat is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811122" version="1" comment="tomcat-admin-webapps is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811123" version="1" comment="tomcat-docs-webapp is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811124" version="1" comment="tomcat-el-3.0-api is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811125" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811126" version="1" comment="tomcat-lib is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811127" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811128" version="1" comment="tomcat-webapps is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811129" version="1" comment="libtiff is &lt;4.4.0-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811130" version="1" comment="libtiff-devel is &lt;4.4.0-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811131" version="1" comment="libtiff-tools is &lt;4.4.0-10.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811132" version="1" comment="libqb is &lt;2.0.6-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811133" version="1" comment="libqb-devel is &lt;2.0.6-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813705" version="1" comment="bpftool is &lt;7.2.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813706" version="1" comment="kernel is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813707" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-362.8.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813708" version="1" comment="kernel-core is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813709" version="1" comment="kernel-cross-headers is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813710" version="1" comment="kernel-debug is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813711" version="1" comment="kernel-debug-core is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813714" version="1" comment="kernel-debug-modules is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813715" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813716" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813717" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813720" version="1" comment="kernel-doc is &lt;5.14.0-362.8.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813721" version="1" comment="kernel-headers is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813722" version="1" comment="kernel-modules is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813723" version="1" comment="kernel-modules-core is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813724" version="1" comment="kernel-modules-extra is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813725" version="1" comment="kernel-tools is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813726" version="1" comment="kernel-tools-libs is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813728" version="1" comment="kernel-uki-virt is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813729" version="1" comment="libperf is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813730" version="1" comment="perf is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813731" version="1" comment="python3-perf is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813732" version="1" comment="rtla is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813733" version="1" comment="rv is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811134" version="1" comment="opensc is &lt;0.23.0-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811135" version="1" comment="binutils is &lt;2.35.2-42.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811136" version="1" comment="binutils-devel is &lt;2.35.2-42.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811137" version="1" comment="binutils-gold is &lt;2.35.2-42.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811138" version="1" comment="iwl100-firmware is &lt;39.31.5.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811139" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811140" version="1" comment="iwl105-firmware is &lt;18.168.6.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811141" version="1" comment="iwl135-firmware is &lt;18.168.6.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811142" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811143" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811144" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811145" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811146" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811147" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811148" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811149" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811150" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811151" version="1" comment="libertas-sd8787-firmware is &lt;20230814-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811152" version="1" comment="linux-firmware is &lt;20230814-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811153" version="1" comment="linux-firmware-whence is &lt;20230814-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811154" version="1" comment="netronome-firmware is &lt;20230814-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811155" version="1" comment="cups is &lt;2.3.3op2-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811156" version="1" comment="cups-client is &lt;2.3.3op2-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811157" version="1" comment="cups-devel is &lt;2.3.3op2-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811158" version="1" comment="cups-filesystem is &lt;2.3.3op2-21.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811159" version="1" comment="cups-ipptool is &lt;2.3.3op2-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811160" version="1" comment="cups-libs is &lt;2.3.3op2-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811161" version="1" comment="cups-lpd is &lt;2.3.3op2-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811162" version="1" comment="cups-printerapp is &lt;2.3.3op2-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811163" version="1" comment="python3-cryptography is &lt;36.0.1-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811164" version="1" comment="protobuf-c is &lt;1.3.3-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811165" version="1" comment="protobuf-c-compiler is &lt;1.3.3-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811166" version="1" comment="protobuf-c-devel is &lt;1.3.3-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810802" version="1" comment="glib2 is &lt;2.68.4-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810803" version="1" comment="glib2-devel is &lt;2.68.4-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810804" version="1" comment="glib2-doc is &lt;2.68.4-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810805" version="1" comment="glib2-static is &lt;2.68.4-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810806" version="1" comment="glib2-tests is &lt;2.68.4-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811167" version="1" comment="shadow-utils is &lt;4.9-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811168" version="1" comment="shadow-utils-subid is &lt;4.9-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811169" version="1" comment="shadow-utils-subid-devel is &lt;4.9-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811170" version="1" comment="c-ares is &lt;1.19.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811171" version="1" comment="c-ares-devel is &lt;1.19.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810807" version="1" comment="libssh is &lt;0.10.4-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810808" version="1" comment="libssh-config is &lt;0.10.4-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810809" version="1" comment="libssh-devel is &lt;0.10.4-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810810" version="1" comment="python-unversioned-command is &lt;3.9.18-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810811" version="1" comment="python3 is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810812" version="1" comment="python3-debug is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810813" version="1" comment="python3-devel is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810814" version="1" comment="python3-idle is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810815" version="1" comment="python3-libs is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810816" version="1" comment="python3-test is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810817" version="1" comment="python3-tkinter is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811172" version="1" comment="gmp is &lt;6.2.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811173" version="1" comment="gmp-c++ is &lt;6.2.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811174" version="1" comment="gmp-devel is &lt;6.2.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813379" version="1" comment="ctdb is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813302" version="1" comment="evolution-mapi is &lt;3.40.1-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813303" version="1" comment="evolution-mapi-langpacks is &lt;3.40.1-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813304" version="1" comment="libnetapi is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813380" version="1" comment="libnetapi-devel is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813305" version="1" comment="libsmbclient is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813381" version="1" comment="libsmbclient-devel is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813306" version="1" comment="libwbclient is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813382" version="1" comment="libwbclient-devel is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813307" version="1" comment="openchange is &lt;2.3-41.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813308" version="1" comment="python3-samba is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813309" version="1" comment="python3-samba-dc is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813383" version="1" comment="python3-samba-devel is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813384" version="1" comment="python3-samba-test is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813310" version="1" comment="samba is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813311" version="1" comment="samba-client is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813312" version="1" comment="samba-client-libs is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813313" version="1" comment="samba-common is &lt;4.18.6-100.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813314" version="1" comment="samba-common-libs is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813315" version="1" comment="samba-common-tools is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813316" version="1" comment="samba-dc-libs is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813317" version="1" comment="samba-dcerpc is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813385" version="1" comment="samba-devel is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813318" version="1" comment="samba-krb5-printing is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813319" version="1" comment="samba-ldb-ldap-modules is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813320" version="1" comment="samba-libs is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813386" version="1" comment="samba-pidl is &lt;4.18.6-100.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813387" version="1" comment="samba-test is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813388" version="1" comment="samba-test-libs is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813321" version="1" comment="samba-tools is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813322" version="1" comment="samba-usershares is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813323" version="1" comment="samba-vfs-iouring is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813324" version="1" comment="samba-winbind is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813325" version="1" comment="samba-winbind-clients is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813326" version="1" comment="samba-winbind-krb5-locator is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813327" version="1" comment="samba-winbind-modules is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813328" version="1" comment="samba-winexe is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811175" version="1" comment="curl is &lt;7.76.1-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811176" version="1" comment="curl-minimal is &lt;7.76.1-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811177" version="1" comment="libcurl is &lt;7.76.1-26.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811178" version="1" comment="libcurl-devel is &lt;7.76.1-26.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811179" version="1" comment="libcurl-minimal is &lt;7.76.1-26.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810818" version="1" comment="tpm2-tss is &lt;3.2.2-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810819" version="1" comment="tpm2-tss-devel is &lt;3.2.2-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811180" version="1" comment="python3-pip is &lt;21.2.3-7.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811181" version="1" comment="python3-pip-wheel is &lt;21.2.3-7.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810820" version="1" comment="ncurses is &lt;6.2-10.20210508.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810821" version="1" comment="ncurses-base is &lt;6.2-10.20210508.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810822" version="1" comment="ncurses-c++-libs is &lt;6.2-10.20210508.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810823" version="1" comment="ncurses-devel is &lt;6.2-10.20210508.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810824" version="1" comment="ncurses-libs is &lt;6.2-10.20210508.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810825" version="1" comment="ncurses-term is &lt;6.2-10.20210508.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810826" version="1" comment="krb5-devel is &lt;1.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810827" version="1" comment="krb5-libs is &lt;1.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810828" version="1" comment="krb5-pkinit is &lt;1.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810829" version="1" comment="krb5-server is &lt;1.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810830" version="1" comment="krb5-server-ldap is &lt;1.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810831" version="1" comment="krb5-workstation is &lt;1.21.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810832" version="1" comment="libkadm5 is &lt;1.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811182" version="1" comment="procps-ng is &lt;3.3.17-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811183" version="1" comment="procps-ng-devel is &lt;3.3.17-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811184" version="1" comment="procps-ng-i18n is &lt;3.3.17-13.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811185" version="1" comment="avahi is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811186" version="1" comment="avahi-compat-howl is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811187" version="1" comment="avahi-compat-howl-devel is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811188" version="1" comment="avahi-compat-libdns_sd is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811189" version="1" comment="avahi-compat-libdns_sd-devel is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811190" version="1" comment="avahi-devel is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811191" version="1" comment="avahi-glib is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811192" version="1" comment="avahi-glib-devel is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811193" version="1" comment="avahi-libs is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811194" version="1" comment="avahi-tools is &lt;0.8-15.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810833" version="1" comment="python3-wheel is &lt;0.36.2-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810834" version="1" comment="python3-wheel-wheel is &lt;0.36.2-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811195" version="1" comment="ghostscript is &lt;9.54.0-14.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811196" version="1" comment="ghostscript-doc is &lt;9.54.0-14.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811197" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-14.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811198" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-14.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811199" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-14.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811200" version="1" comment="ghostscript-x11 is &lt;9.54.0-14.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811201" version="1" comment="libgs is &lt;9.54.0-14.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811202" version="1" comment="libgs-devel is &lt;9.54.0-14.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813734" version="1" comment="java-21-openjdk is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813735" version="1" comment="java-21-openjdk-demo is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813736" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813737" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813738" version="1" comment="java-21-openjdk-devel is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813739" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813740" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813741" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813742" version="1" comment="java-21-openjdk-headless is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813743" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813744" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813745" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813746" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813747" version="1" comment="java-21-openjdk-jmods is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813748" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813749" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813750" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813751" version="1" comment="java-21-openjdk-src is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813752" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813753" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813754" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813755" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813756" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811203" version="1" comment="ctdb is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811204" version="1" comment="libnetapi is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811205" version="1" comment="libnetapi-devel is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811206" version="1" comment="libsmbclient is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811207" version="1" comment="libsmbclient-devel is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811208" version="1" comment="libwbclient is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811209" version="1" comment="libwbclient-devel is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811210" version="1" comment="python3-samba is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811211" version="1" comment="python3-samba-dc is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811212" version="1" comment="python3-samba-devel is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811213" version="1" comment="python3-samba-test is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811214" version="1" comment="samba is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811215" version="1" comment="samba-client is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811216" version="1" comment="samba-client-libs is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811217" version="1" comment="samba-common is &lt;4.18.6-101.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811218" version="1" comment="samba-common-libs is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811219" version="1" comment="samba-common-tools is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811220" version="1" comment="samba-dc-libs is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811221" version="1" comment="samba-dcerpc is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811222" version="1" comment="samba-devel is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811223" version="1" comment="samba-krb5-printing is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811224" version="1" comment="samba-ldb-ldap-modules is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811225" version="1" comment="samba-libs is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811226" version="1" comment="samba-pidl is &lt;4.18.6-101.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811227" version="1" comment="samba-test is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811228" version="1" comment="samba-test-libs is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811229" version="1" comment="samba-tools is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811230" version="1" comment="samba-usershares is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811231" version="1" comment="samba-vfs-iouring is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811232" version="1" comment="samba-winbind is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811233" version="1" comment="samba-winbind-clients is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811234" version="1" comment="samba-winbind-krb5-locator is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811235" version="1" comment="samba-winbind-modules is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811236" version="1" comment="samba-winexe is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811237" version="1" comment="curl is &lt;7.76.1-26.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811238" version="1" comment="curl-minimal is &lt;7.76.1-26.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811239" version="1" comment="libcurl is &lt;7.76.1-26.el9_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811240" version="1" comment="libcurl-devel is &lt;7.76.1-26.el9_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811241" version="1" comment="libcurl-minimal is &lt;7.76.1-26.el9_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811242" version="1" comment="libnghttp2 is &lt;1.43.0-5.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811243" version="1" comment="libnghttp2-devel is &lt;1.43.0-5.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811244" version="1" comment="nghttp2 is &lt;1.43.0-5.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811245" version="1" comment="squid is &lt;5.5-6.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814533" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814534" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814535" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814536" version="1" comment="dotnet-host is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814537" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814538" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814539" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.100-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814540" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.100-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814541" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814542" version="1" comment="dotnet-templates-8.0 is &lt;8.0.100-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814543" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.100-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811269" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811270" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811271" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811272" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811273" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811274" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.114-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811275" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.114-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811276" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811277" version="1" comment="dotnet-templates-7.0 is &lt;7.0.114-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811278" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.25-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811279" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.25-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811280" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.25-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811281" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.25-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811282" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.25-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811283" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.125-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811284" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.125-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811285" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.25-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811286" version="1" comment="dotnet-templates-6.0 is &lt;6.0.125-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811287" version="1" comment="open-vm-tools is &lt;12.2.5-3.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811288" version="1" comment="open-vm-tools-desktop is &lt;12.2.5-3.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811289" version="1" comment="open-vm-tools-salt-minion is &lt;12.2.5-3.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811290" version="1" comment="open-vm-tools-sdmp is &lt;12.2.5-3.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811291" version="1" comment="open-vm-tools-test is &lt;12.2.5-3.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813389" version="1" comment="squid is &lt;5.5-6.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814342" version="1" comment="thunderbird is &lt;115.5.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814544" version="1" comment="firefox is &lt;115.5.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814545" version="1" comment="firefox-x11 is &lt;115.5.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816706" version="1" comment="apr is &lt;1.7.0-12.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816707" version="1" comment="apr-devel is &lt;1.7.0-12.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816418" version="1" comment="tracker-miners is &lt;3.1.2-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816419" version="1" comment="webkit2gtk3 is &lt;2.40.5-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816420" version="1" comment="webkit2gtk3-devel is &lt;2.40.5-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816421" version="1" comment="webkit2gtk3-jsc is &lt;2.40.5-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816422" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.40.5-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816708" version="1" comment="libxml2 is &lt;2.9.13-5.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816709" version="1" comment="libxml2-devel is &lt;2.9.13-5.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816710" version="1" comment="python3-libxml2 is &lt;2.9.13-5.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816058" version="1" comment="bpftool is &lt;7.2.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816059" version="1" comment="kernel is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816060" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-362.13.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816061" version="1" comment="kernel-core is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816062" version="1" comment="kernel-cross-headers is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816063" version="1" comment="kernel-debug is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816064" version="1" comment="kernel-debug-core is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816067" version="1" comment="kernel-debug-modules is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816068" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816069" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816070" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816073" version="1" comment="kernel-doc is &lt;5.14.0-362.13.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816074" version="1" comment="kernel-headers is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816075" version="1" comment="kernel-modules is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816076" version="1" comment="kernel-modules-core is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816077" version="1" comment="kernel-modules-extra is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816078" version="1" comment="kernel-tools is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816079" version="1" comment="kernel-tools-libs is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816081" version="1" comment="kernel-uki-virt is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816082" version="1" comment="libperf is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816083" version="1" comment="perf is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816084" version="1" comment="python3-perf is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816085" version="1" comment="rtla is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816086" version="1" comment="rv is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846265" version="1" comment="fence-agents-aliyun is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846266" version="1" comment="fence-agents-all is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846267" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846268" version="1" comment="fence-agents-apc is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846269" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846270" version="1" comment="fence-agents-aws is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846271" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846272" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846273" version="1" comment="fence-agents-brocade is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846274" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846275" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846276" version="1" comment="fence-agents-common is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846277" version="1" comment="fence-agents-compute is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846278" version="1" comment="fence-agents-drac5 is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846279" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846280" version="1" comment="fence-agents-emerson is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846281" version="1" comment="fence-agents-eps is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846282" version="1" comment="fence-agents-gce is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846283" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846284" version="1" comment="fence-agents-hpblade is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846285" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846286" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846287" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846288" version="1" comment="fence-agents-ifmib is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846289" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846290" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846291" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846292" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846293" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846294" version="1" comment="fence-agents-ipdu is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846295" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846296" version="1" comment="fence-agents-kdump is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846297" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846298" version="1" comment="fence-agents-mpath is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846299" version="1" comment="fence-agents-openstack is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846300" version="1" comment="fence-agents-redfish is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846301" version="1" comment="fence-agents-rhevm is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846302" version="1" comment="fence-agents-rsa is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846303" version="1" comment="fence-agents-rsb is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846304" version="1" comment="fence-agents-sbd is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846305" version="1" comment="fence-agents-scsi is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846306" version="1" comment="fence-agents-virsh is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846307" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846308" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846309" version="1" comment="fence-agents-wti is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846310" version="1" comment="fence-virt is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846311" version="1" comment="fence-virtd is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846312" version="1" comment="fence-virtd-cpg is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846313" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846314" version="1" comment="fence-virtd-multicast is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846315" version="1" comment="fence-virtd-serial is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846316" version="1" comment="fence-virtd-tcp is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846317" version="1" comment="ha-cloud-support is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816423" version="1" comment="pixman is &lt;0.40.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816424" version="1" comment="pixman-devel is &lt;0.40.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816425" version="1" comment="skopeo is &lt;1.13.3-3.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816426" version="1" comment="skopeo-tests is &lt;1.13.3-3.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816427" version="1" comment="runc is &lt;1.1.9-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816428" version="1" comment="buildah is &lt;1.31.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816429" version="1" comment="buildah-tests is &lt;1.31.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816430" version="1" comment="podman is &lt;4.6.1-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816431" version="1" comment="podman-docker is &lt;4.6.1-7.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816432" version="1" comment="podman-gvproxy is &lt;4.6.1-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816433" version="1" comment="podman-plugins is &lt;4.6.1-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816434" version="1" comment="podman-remote is &lt;4.6.1-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816435" version="1" comment="podman-tests is &lt;4.6.1-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816436" version="1" comment="containernetworking-plugins is &lt;1.3.0-6.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816711" version="1" comment="postgresql is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816712" version="1" comment="postgresql-contrib is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816713" version="1" comment="postgresql-docs is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816714" version="1" comment="postgresql-plperl is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816715" version="1" comment="postgresql-plpython3 is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816716" version="1" comment="postgresql-pltcl is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816717" version="1" comment="postgresql-private-devel is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816718" version="1" comment="postgresql-private-libs is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816719" version="1" comment="postgresql-server is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816720" version="1" comment="postgresql-server-devel is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816721" version="1" comment="postgresql-static is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816722" version="1" comment="postgresql-test is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816723" version="1" comment="postgresql-upgrade is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816724" version="1" comment="postgresql-upgrade-devel is &lt;13.13-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816725" version="1" comment="postgresql is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816726" version="1" comment="postgresql-contrib is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816727" version="1" comment="postgresql-docs is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816728" version="1" comment="postgresql-plperl is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816729" version="1" comment="postgresql-plpython3 is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816730" version="1" comment="postgresql-pltcl is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816731" version="1" comment="postgresql-private-devel is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816732" version="1" comment="postgresql-private-libs is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816733" version="1" comment="postgresql-server is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816734" version="1" comment="postgresql-server-devel is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816735" version="1" comment="postgresql-static is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816736" version="1" comment="postgresql-test is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816737" version="1" comment="postgresql-test-rpm-macros is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816738" version="1" comment="postgresql-upgrade is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816739" version="1" comment="postgresql-upgrade-devel is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816825" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.22.1-2.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816826" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.22.1-2.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818054" version="1" comment="opensc is &lt;0.23.0-3.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818847" version="1" comment="thunderbird is &lt;115.6.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818848" version="1" comment="tigervnc is &lt;1.13.1-3.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818849" version="1" comment="tigervnc-icons is &lt;1.13.1-3.el9_3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818850" version="1" comment="tigervnc-license is &lt;1.13.1-3.el9_3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818851" version="1" comment="tigervnc-selinux is &lt;1.13.1-3.el9_3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818852" version="1" comment="tigervnc-server is &lt;1.13.1-3.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818853" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-3.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818854" version="1" comment="tigervnc-server-module is &lt;1.13.1-3.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818855" version="1" comment="firefox is &lt;115.6.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818856" version="1" comment="firefox-x11 is &lt;115.6.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819046" version="1" comment="squid is &lt;5.5-6.el9_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844491" version="1" comment="nspr is &lt;4.35.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844492" version="1" comment="nspr-devel is &lt;4.35.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844493" version="1" comment="nss is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844494" version="1" comment="nss-devel is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844495" version="1" comment="nss-softokn is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844496" version="1" comment="nss-softokn-devel is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844497" version="1" comment="nss-softokn-freebl is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844498" version="1" comment="nss-softokn-freebl-devel is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844499" version="1" comment="nss-sysinit is &lt;3.90.0-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844500" version="1" comment="nss-tools is &lt;3.90.0-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844501" version="1" comment="nss-util is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844502" version="1" comment="nss-util-devel is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819534" version="1" comment="ipa-client is &lt;4.10.2-5.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819535" version="1" comment="ipa-client-common is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819536" version="1" comment="ipa-client-epn is &lt;4.10.2-5.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819537" version="1" comment="ipa-client-samba is &lt;4.10.2-5.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819538" version="1" comment="ipa-common is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819539" version="1" comment="ipa-selinux is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819540" version="1" comment="ipa-server is &lt;4.10.2-5.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819541" version="1" comment="ipa-server-common is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819542" version="1" comment="ipa-server-dns is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819543" version="1" comment="ipa-server-trust-ad is &lt;4.10.2-5.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819544" version="1" comment="python3-ipaclient is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819545" version="1" comment="python3-ipalib is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819546" version="1" comment="python3-ipaserver is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819547" version="1" comment="python3-ipatests is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872189" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.15-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872190" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.15-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872191" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.15-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872192" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.15-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872193" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.15-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872194" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.115-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872195" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.115-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872196" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.15-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872197" version="1" comment="dotnet-templates-7.0 is &lt;7.0.115-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819548" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819549" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819550" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819551" version="1" comment="dotnet-host is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819552" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819553" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819554" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.101-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819555" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.101-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819556" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819557" version="1" comment="dotnet-templates-8.0 is &lt;8.0.101-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819558" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.101-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819673" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.26-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819674" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.26-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819675" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.26-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819676" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.26-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819677" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.26-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819678" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.126-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819679" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.126-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819680" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.26-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819681" version="1" comment="dotnet-templates-6.0 is &lt;6.0.126-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819996" version="1" comment="java-21-openjdk is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819997" version="1" comment="java-21-openjdk-demo is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819998" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819999" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820000" version="1" comment="java-21-openjdk-devel is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820001" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820002" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820003" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820004" version="1" comment="java-21-openjdk-headless is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820005" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820006" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820007" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820008" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820009" version="1" comment="java-21-openjdk-jmods is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820010" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820011" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820012" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820013" version="1" comment="java-21-openjdk-src is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820014" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820015" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820016" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820017" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820018" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844464" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844465" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.402.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844466" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.402.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844467" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.402.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844468" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844469" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844470" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844471" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844472" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844473" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844474" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844475" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844476" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844477" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844478" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.402.b06-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844479" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.402.b06-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844480" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844481" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844482" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844483" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845119" version="1" comment="java-11-openjdk is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845120" version="1" comment="java-11-openjdk-demo is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845121" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845122" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845123" version="1" comment="java-11-openjdk-devel is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845124" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845125" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845126" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845127" version="1" comment="java-11-openjdk-headless is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845128" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845129" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845130" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845131" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845132" version="1" comment="java-11-openjdk-jmods is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845133" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845134" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845135" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845136" version="1" comment="java-11-openjdk-src is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845137" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845138" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845139" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845140" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845141" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849165" version="1" comment="java-17-openjdk is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849166" version="1" comment="java-17-openjdk-demo is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849167" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849168" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849169" version="1" comment="java-17-openjdk-devel is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849170" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849171" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849172" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849173" version="1" comment="java-17-openjdk-headless is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849174" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849175" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849176" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849177" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849178" version="1" comment="java-17-openjdk-jmods is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849179" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849180" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849181" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849182" version="1" comment="java-17-openjdk-src is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849183" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849184" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849185" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849186" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849187" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844796" version="1" comment="openssl is &lt;3.0.7-25.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844797" version="1" comment="openssl-devel is &lt;3.0.7-25.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844798" version="1" comment="openssl-libs is &lt;3.0.7-25.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844799" version="1" comment="openssl-perl is &lt;3.0.7-25.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844596" version="1" comment="php is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844597" version="1" comment="php-bcmath is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844598" version="1" comment="php-cli is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844599" version="1" comment="php-common is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844600" version="1" comment="php-dba is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844601" version="1" comment="php-dbg is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844602" version="1" comment="php-devel is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844603" version="1" comment="php-embedded is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844604" version="1" comment="php-enchant is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844605" version="1" comment="php-ffi is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844606" version="1" comment="php-fpm is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844607" version="1" comment="php-gd is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844608" version="1" comment="php-gmp is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844609" version="1" comment="php-intl is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844610" version="1" comment="php-ldap is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844611" version="1" comment="php-mbstring is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844612" version="1" comment="php-mysqlnd is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844613" version="1" comment="php-odbc is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844614" version="1" comment="php-opcache is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844615" version="1" comment="php-pdo is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844616" version="1" comment="php-pgsql is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844617" version="1" comment="php-process is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844618" version="1" comment="php-snmp is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844619" version="1" comment="php-soap is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844620" version="1" comment="php-xml is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845886" version="1" comment="bpftool is &lt;7.2.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845887" version="1" comment="kernel is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845888" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-362.18.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845889" version="1" comment="kernel-core is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846368" version="1" comment="kernel-cross-headers is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845890" version="1" comment="kernel-debug is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845891" version="1" comment="kernel-debug-core is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845894" version="1" comment="kernel-debug-modules is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845895" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845896" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845897" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845900" version="1" comment="kernel-doc is &lt;5.14.0-362.18.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845901" version="1" comment="kernel-headers is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845902" version="1" comment="kernel-modules is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845903" version="1" comment="kernel-modules-core is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845904" version="1" comment="kernel-modules-extra is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845905" version="1" comment="kernel-tools is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845906" version="1" comment="kernel-tools-libs is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845907" version="1" comment="kernel-uki-virt is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846370" version="1" comment="libperf is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845908" version="1" comment="perf is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845909" version="1" comment="python3-perf is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845910" version="1" comment="rtla is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845911" version="1" comment="rv is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844503" version="1" comment="python3-rpm is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844504" version="1" comment="rpm is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844505" version="1" comment="rpm-apidocs is &lt;4.16.1.3-27.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844506" version="1" comment="rpm-build is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844507" version="1" comment="rpm-build-libs is &lt;4.16.1.3-27.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844508" version="1" comment="rpm-cron is &lt;4.16.1.3-27.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844509" version="1" comment="rpm-devel is &lt;4.16.1.3-27.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844510" version="1" comment="rpm-libs is &lt;4.16.1.3-27.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844511" version="1" comment="rpm-plugin-audit is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844512" version="1" comment="rpm-plugin-fapolicyd is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844513" version="1" comment="rpm-plugin-ima is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844514" version="1" comment="rpm-plugin-selinux is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844515" version="1" comment="rpm-plugin-syslog is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844516" version="1" comment="rpm-plugin-systemd-inhibit is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844517" version="1" comment="rpm-sign is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844518" version="1" comment="rpm-sign-libs is &lt;4.16.1.3-27.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845159" version="1" comment="python3-urllib3 is &lt;1.26.5-3.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844800" version="1" comment="sqlite is &lt;3.34.1-7.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844801" version="1" comment="sqlite-devel is &lt;3.34.1-7.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844802" version="1" comment="sqlite-libs is &lt;3.34.1-7.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845160" version="1" comment="python-unversioned-command is &lt;3.9.18-1.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845161" version="1" comment="python3 is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845162" version="1" comment="python3-debug is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845163" version="1" comment="python3-devel is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845164" version="1" comment="python3-idle is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845165" version="1" comment="python3-libs is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845166" version="1" comment="python3-test is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845167" version="1" comment="python3-tkinter is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845912" version="1" comment="grub2-common is &lt;2.06-70.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845913" version="1" comment="grub2-efi-x64 is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845914" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845915" version="1" comment="grub2-efi-x64-modules is &lt;2.06-70.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845916" version="1" comment="grub2-pc is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845917" version="1" comment="grub2-pc-modules is &lt;2.06-70.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845918" version="1" comment="grub2-tools is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845919" version="1" comment="grub2-tools-efi is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845920" version="1" comment="grub2-tools-extra is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845921" version="1" comment="grub2-tools-minimal is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849878" version="1" comment="tomcat is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849879" version="1" comment="tomcat-admin-webapps is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849880" version="1" comment="tomcat-docs-webapp is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849881" version="1" comment="tomcat-el-3.0-api is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849882" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849883" version="1" comment="tomcat-lib is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849884" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849885" version="1" comment="tomcat-webapps is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872198" version="1" comment="frr is &lt;8.3.1-11.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872199" version="1" comment="frr-selinux is &lt;8.3.1-11.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844803" version="1" comment="gnutls is &lt;3.7.6-23.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844804" version="1" comment="gnutls-c++ is &lt;3.7.6-23.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844805" version="1" comment="gnutls-dane is &lt;3.7.6-23.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844806" version="1" comment="gnutls-devel is &lt;3.7.6-23.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844807" version="1" comment="gnutls-utils is &lt;3.7.6-23.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846318" version="1" comment="tigervnc is &lt;1.13.1-3.el9_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846319" version="1" comment="tigervnc-icons is &lt;1.13.1-3.el9_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846320" version="1" comment="tigervnc-license is &lt;1.13.1-3.el9_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846321" version="1" comment="tigervnc-selinux is &lt;1.13.1-3.el9_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846322" version="1" comment="tigervnc-server is &lt;1.13.1-3.el9_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846323" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-3.el9_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846324" version="1" comment="tigervnc-server-module is &lt;1.13.1-3.el9_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845293" version="1" comment="thunderbird is &lt;115.7.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845168" version="1" comment="firefox is &lt;115.7.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845169" version="1" comment="firefox-x11 is &lt;115.7.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845594" version="1" comment="runc is &lt;1.1.12-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872200" version="1" comment="gimp is &lt;2.99.8-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872201" version="1" comment="gimp-libs is &lt;2.99.8-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848261" version="1" comment="nspr is &lt;4.35.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848262" version="1" comment="nspr-devel is &lt;4.35.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848263" version="1" comment="nss is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848264" version="1" comment="nss-devel is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848265" version="1" comment="nss-softokn is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848266" version="1" comment="nss-softokn-devel is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848267" version="1" comment="nss-softokn-freebl is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848268" version="1" comment="nss-softokn-freebl-devel is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848269" version="1" comment="nss-sysinit is &lt;3.90.0-6.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848270" version="1" comment="nss-tools is &lt;3.90.0-6.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848271" version="1" comment="nss-util is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848272" version="1" comment="nss-util-devel is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872202" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.16-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872203" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.16-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872204" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.16-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872205" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.16-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872206" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.16-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872207" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.116-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872208" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.116-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872209" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.16-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872210" version="1" comment="dotnet-templates-7.0 is &lt;7.0.116-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846371" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.27-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846372" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.27-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846373" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.27-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846374" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.27-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846375" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.27-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846376" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.127-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846377" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.127-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846378" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.27-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846379" version="1" comment="dotnet-templates-6.0 is &lt;6.0.127-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848258" version="1" comment="sudo is &lt;1.9.5p2-10.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848259" version="1" comment="sudo-python-plugin is &lt;1.9.5p2-10.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872211" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872212" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872213" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872214" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872215" version="1" comment="dotnet-host is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872216" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872217" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872218" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872219" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.102-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872220" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.102-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872221" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.102-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872222" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872223" version="1" comment="dotnet-templates-8.0 is &lt;8.0.102-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872224" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.102-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848886" version="1" comment="postgresql is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848887" version="1" comment="postgresql-contrib is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848888" version="1" comment="postgresql-docs is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848889" version="1" comment="postgresql-plperl is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848890" version="1" comment="postgresql-plpython3 is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848891" version="1" comment="postgresql-pltcl is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848892" version="1" comment="postgresql-private-devel is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848893" version="1" comment="postgresql-private-libs is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848894" version="1" comment="postgresql-server is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848895" version="1" comment="postgresql-server-devel is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848896" version="1" comment="postgresql-static is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848897" version="1" comment="postgresql-test is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848898" version="1" comment="postgresql-test-rpm-macros is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848899" version="1" comment="postgresql-upgrade is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848900" version="1" comment="postgresql-upgrade-devel is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848901" version="1" comment="postgresql is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848902" version="1" comment="postgresql-contrib is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848903" version="1" comment="postgresql-docs is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848904" version="1" comment="postgresql-plperl is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848905" version="1" comment="postgresql-plpython3 is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848906" version="1" comment="postgresql-pltcl is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848907" version="1" comment="postgresql-private-devel is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848908" version="1" comment="postgresql-private-libs is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848909" version="1" comment="postgresql-server is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848910" version="1" comment="postgresql-server-devel is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848911" version="1" comment="postgresql-static is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848912" version="1" comment="postgresql-test is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848913" version="1" comment="postgresql-upgrade is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848914" version="1" comment="postgresql-upgrade-devel is &lt;13.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849200" version="1" comment="firefox is &lt;115.8.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849201" version="1" comment="firefox-x11 is &lt;115.8.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849711" version="1" comment="thunderbird is &lt;115.8.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849490" version="1" comment="opensc is &lt;0.23.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849202" version="1" comment="python3-unbound is &lt;1.16.2-3.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849203" version="1" comment="unbound is &lt;1.16.2-3.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849204" version="1" comment="unbound-devel is &lt;1.16.2-3.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849205" version="1" comment="unbound-libs is &lt;1.16.2-3.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953522" version="1" comment="tigervnc is &lt;1.14.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953523" version="1" comment="tigervnc-icons is &lt;1.14.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953524" version="1" comment="tigervnc-license is &lt;1.14.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953525" version="1" comment="tigervnc-selinux is &lt;1.14.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953526" version="1" comment="tigervnc-server is &lt;1.14.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953527" version="1" comment="tigervnc-server-minimal is &lt;1.14.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953528" version="1" comment="tigervnc-server-module is &lt;1.14.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955015" version="1" comment="perl-App-cpanminus is &lt;1.7044-14.1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955016" version="1" comment="pam is &lt;1.5.1-22.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955017" version="1" comment="pam-devel is &lt;1.5.1-22.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955018" version="1" comment="pam-docs is &lt;1.5.1-22.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955019" version="1" comment="bpftool is &lt;7.4.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955020" version="1" comment="kernel is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955021" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.15.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955022" version="1" comment="kernel-core is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955023" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955024" version="1" comment="kernel-debug is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955025" version="1" comment="kernel-debug-core is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955028" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955029" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955030" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955031" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955034" version="1" comment="kernel-doc is &lt;5.14.0-503.15.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955035" version="1" comment="kernel-headers is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955036" version="1" comment="kernel-modules is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955037" version="1" comment="kernel-modules-core is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955038" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955039" version="1" comment="kernel-tools is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955040" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955042" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955043" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955044" version="1" comment="libperf is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955045" version="1" comment="perf is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955046" version="1" comment="python3-perf is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955047" version="1" comment="rtla is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955048" version="1" comment="rv is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955680" version="1" comment="tuned is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955681" version="1" comment="tuned-gtk is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955682" version="1" comment="tuned-ppd is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955683" version="1" comment="tuned-profiles-atomic is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955684" version="1" comment="tuned-profiles-cpu-partitioning is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955685" version="1" comment="tuned-profiles-mssql is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955686" version="1" comment="tuned-profiles-oracle is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955687" version="1" comment="tuned-profiles-postgresql is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955688" version="1" comment="tuned-profiles-spectrumscale is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955689" version="1" comment="tuned-utils is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955240" version="1" comment="webkit2gtk3 is &lt;2.46.3-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955241" version="1" comment="webkit2gtk3-devel is &lt;2.46.3-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955242" version="1" comment="webkit2gtk3-jsc is &lt;2.46.3-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955243" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.3-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955690" version="1" comment="python3-tornado is &lt;6.4.2-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955691" version="1" comment="thunderbird is &lt;128.5.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957245" version="1" comment="firefox is &lt;128.5.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957246" version="1" comment="firefox-x11 is &lt;128.5.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851378" version="1" comment="edk2-ovmf is &lt;20230524-4.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851379" version="1" comment="edk2-tools is &lt;20230524-4.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851380" version="1" comment="edk2-tools-doc is &lt;20230524-4.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958991" version="1" comment="postgresql is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958992" version="1" comment="postgresql-contrib is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958993" version="1" comment="postgresql-docs is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958994" version="1" comment="postgresql-plperl is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958995" version="1" comment="postgresql-plpython3 is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958996" version="1" comment="postgresql-pltcl is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958997" version="1" comment="postgresql-private-devel is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958998" version="1" comment="postgresql-private-libs is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958999" version="1" comment="postgresql-server is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959000" version="1" comment="postgresql-server-devel is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959001" version="1" comment="postgresql-static is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959002" version="1" comment="postgresql-test is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959003" version="1" comment="postgresql-test-rpm-macros is &lt;13.18-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959004" version="1" comment="postgresql-upgrade is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959005" version="1" comment="postgresql-upgrade-devel is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957092" version="1" comment="ruby is &lt;3.0.7-163.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957093" version="1" comment="ruby-default-gems is &lt;3.0.7-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957094" version="1" comment="ruby-devel is &lt;3.0.7-163.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957095" version="1" comment="ruby-doc is &lt;3.0.7-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957096" version="1" comment="ruby-libs is &lt;3.0.7-163.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957097" version="1" comment="rubygem-bigdecimal is &lt;3.0.0-163.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957098" version="1" comment="rubygem-bundler is &lt;2.2.33-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957099" version="1" comment="rubygem-io-console is &lt;0.5.7-163.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957100" version="1" comment="rubygem-irb is &lt;1.3.5-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957101" version="1" comment="rubygem-json is &lt;2.5.1-163.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957102" version="1" comment="rubygem-minitest is &lt;5.14.2-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957103" version="1" comment="rubygem-power_assert is &lt;1.2.1-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957104" version="1" comment="rubygem-psych is &lt;3.3.2-163.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957105" version="1" comment="rubygem-rake is &lt;13.0.3-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957106" version="1" comment="rubygem-rbs is &lt;1.4.0-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957107" version="1" comment="rubygem-rdoc is &lt;6.3.4.1-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957108" version="1" comment="rubygem-rexml is &lt;3.2.5-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957109" version="1" comment="rubygem-rss is &lt;0.2.9-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957110" version="1" comment="rubygem-test-unit is &lt;3.3.7-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957111" version="1" comment="rubygem-typeprof is &lt;0.15.2-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957112" version="1" comment="rubygems is &lt;3.2.33-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957113" version="1" comment="rubygems-devel is &lt;3.2.33-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957114" version="1" comment="ruby is &lt;3.1.5-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957115" version="1" comment="ruby-bundled-gems is &lt;3.1.5-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957116" version="1" comment="ruby-default-gems is &lt;3.1.5-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957117" version="1" comment="ruby-devel is &lt;3.1.5-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957118" version="1" comment="ruby-doc is &lt;3.1.5-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957119" version="1" comment="ruby-libs is &lt;3.1.5-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957120" version="1" comment="rubygem-bigdecimal is &lt;3.1.1-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957121" version="1" comment="rubygem-bundler is &lt;2.3.27-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957122" version="1" comment="rubygem-io-console is &lt;0.5.11-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957123" version="1" comment="rubygem-irb is &lt;1.4.1-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957124" version="1" comment="rubygem-json is &lt;2.6.1-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957125" version="1" comment="rubygem-minitest is &lt;5.15.0-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872260" version="1" comment="rubygem-mysql2 is &lt;0.5.4-1.module+el9.1.0+15737+76195479 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872261" version="1" comment="rubygem-mysql2-doc is &lt;0.5.4-1.module+el9.1.0+15737+76195479 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872262" version="1" comment="rubygem-pg is &lt;1.3.5-1.module+el9.1.0+15737+76195479 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872263" version="1" comment="rubygem-pg-doc is &lt;1.3.5-1.module+el9.1.0+15737+76195479 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957126" version="1" comment="rubygem-power_assert is &lt;2.0.1-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957127" version="1" comment="rubygem-psych is &lt;4.0.4-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957128" version="1" comment="rubygem-rake is &lt;13.0.6-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957129" version="1" comment="rubygem-rbs is &lt;2.7.0-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957130" version="1" comment="rubygem-rdoc is &lt;6.4.1.1-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957131" version="1" comment="rubygem-rexml is &lt;3.2.5-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957132" version="1" comment="rubygem-rss is &lt;0.2.9-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957133" version="1" comment="rubygem-test-unit is &lt;3.5.3-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957134" version="1" comment="rubygem-typeprof is &lt;0.21.3-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957135" version="1" comment="rubygems is &lt;3.3.27-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957136" version="1" comment="rubygems-devel is &lt;3.3.27-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956891" version="1" comment="redis is &lt;7.2.6-1.module+el9.5.0+22422+63e067d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956892" version="1" comment="redis-devel is &lt;7.2.6-1.module+el9.5.0+22422+63e067d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956893" version="1" comment="redis-doc is &lt;7.2.6-1.module+el9.5.0+22422+63e067d8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957437" version="1" comment="bpftool is &lt;7.4.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957438" version="1" comment="kernel is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957439" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.16.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957440" version="1" comment="kernel-core is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957441" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957442" version="1" comment="kernel-debug is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957443" version="1" comment="kernel-debug-core is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957446" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957447" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957448" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957449" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957452" version="1" comment="kernel-doc is &lt;5.14.0-503.16.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957453" version="1" comment="kernel-headers is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957454" version="1" comment="kernel-modules is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957455" version="1" comment="kernel-modules-core is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957456" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957457" version="1" comment="kernel-tools is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957458" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957460" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957461" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957462" version="1" comment="libperf is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957463" version="1" comment="perf is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957464" version="1" comment="python3-perf is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957465" version="1" comment="rtla is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957466" version="1" comment="rv is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957467" version="1" comment="apcu-panel is &lt;5.1.23-1.module+el9.4.0+20748+b46899d2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957468" version="1" comment="php is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957469" version="1" comment="php-bcmath is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957470" version="1" comment="php-cli is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957471" version="1" comment="php-common is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957472" version="1" comment="php-dba is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957473" version="1" comment="php-dbg is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957474" version="1" comment="php-devel is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957475" version="1" comment="php-embedded is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957476" version="1" comment="php-enchant is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957477" version="1" comment="php-ffi is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957478" version="1" comment="php-fpm is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957479" version="1" comment="php-gd is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957480" version="1" comment="php-gmp is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957481" version="1" comment="php-intl is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957482" version="1" comment="php-ldap is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957483" version="1" comment="php-mbstring is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957484" version="1" comment="php-mysqlnd is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957485" version="1" comment="php-odbc is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957486" version="1" comment="php-opcache is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957487" version="1" comment="php-pdo is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957488" version="1" comment="php-pecl-apcu is &lt;5.1.23-1.module+el9.4.0+20748+b46899d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957489" version="1" comment="php-pecl-apcu-devel is &lt;5.1.23-1.module+el9.4.0+20748+b46899d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957490" version="1" comment="php-pecl-rrd is &lt;2.0.3-4.module+el9.4.0+20748+b46899d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957491" version="1" comment="php-pecl-xdebug3 is &lt;3.2.2-2.module+el9.4.0+20796+bd4564df for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957492" version="1" comment="php-pecl-zip is &lt;1.22.3-1.module+el9.4.0+20748+b46899d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957493" version="1" comment="php-pgsql is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957494" version="1" comment="php-process is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957495" version="1" comment="php-snmp is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957496" version="1" comment="php-soap is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957497" version="1" comment="php-xml is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957498" version="1" comment="php is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957499" version="1" comment="php-bcmath is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957500" version="1" comment="php-cli is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957501" version="1" comment="php-common is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957502" version="1" comment="php-dba is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957503" version="1" comment="php-dbg is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957504" version="1" comment="php-devel is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957505" version="1" comment="php-embedded is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957506" version="1" comment="php-enchant is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957507" version="1" comment="php-ffi is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957508" version="1" comment="php-fpm is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957509" version="1" comment="php-gd is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957510" version="1" comment="php-gmp is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957511" version="1" comment="php-intl is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957512" version="1" comment="php-ldap is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957513" version="1" comment="php-mbstring is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957514" version="1" comment="php-mysqlnd is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957515" version="1" comment="php-odbc is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957516" version="1" comment="php-opcache is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957517" version="1" comment="php-pdo is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957518" version="1" comment="php-pgsql is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957519" version="1" comment="php-process is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957520" version="1" comment="php-snmp is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957521" version="1" comment="php-soap is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957522" version="1" comment="php-xml is &lt;8.1.30-1.module+el9.5.0+22481+3e1c6d75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957523" version="1" comment="python3.12 is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957524" version="1" comment="python3.12-debug is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957525" version="1" comment="python3.12-devel is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957526" version="1" comment="python3.12-idle is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957527" version="1" comment="python3.12-libs is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957528" version="1" comment="python3.12-test is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957529" version="1" comment="python3.12-tkinter is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957530" version="1" comment="python-unversioned-command is &lt;3.9.21-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957531" version="1" comment="python3 is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957532" version="1" comment="python3-debug is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957533" version="1" comment="python3-devel is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957534" version="1" comment="python3-idle is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957535" version="1" comment="python3-libs is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957536" version="1" comment="python3-test is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957537" version="1" comment="python3-tkinter is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958268" version="1" comment="python3.11 is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958269" version="1" comment="python3.11-debug is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958270" version="1" comment="python3.11-devel is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958271" version="1" comment="python3.11-idle is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958272" version="1" comment="python3.11-libs is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958273" version="1" comment="python3.11-test is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958274" version="1" comment="python3.11-tkinter is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958275" version="1" comment="gstreamer1-plugins-good is &lt;1.22.1-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958276" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.22.1-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958277" version="1" comment="gstreamer1-plugins-base is &lt;1.22.1-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958278" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.22.1-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958279" version="1" comment="gstreamer1-plugins-base-tools is &lt;1.22.1-3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958544" version="1" comment="containernetworking-plugins is &lt;1.5.1-3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958545" version="1" comment="skopeo is &lt;1.16.1-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958546" version="1" comment="skopeo-tests is &lt;1.16.1-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959121" version="1" comment="edk2-tools is &lt;20240524-6.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959122" version="1" comment="edk2-tools-doc is &lt;20240524-6.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959006" version="1" comment="unbound-devel is &lt;1.16.2-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959007" version="1" comment="libsndfile is &lt;1.0.31-8.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959008" version="1" comment="libsndfile-devel is &lt;1.0.31-8.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959009" version="1" comment="libsndfile-utils is &lt;1.0.31-8.el9_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958547" version="1" comment="python3.11-urllib3 is &lt;1.26.12-2.el9_5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958880" version="1" comment="mpg123 is &lt;1.32.9-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958881" version="1" comment="mpg123-devel is &lt;1.32.9-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958882" version="1" comment="mpg123-libs is &lt;1.32.9-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958883" version="1" comment="mpg123-plugins-pulseaudio is &lt;1.32.9-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849945" version="1" comment="curl is &lt;7.76.1-26.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849946" version="1" comment="curl-minimal is &lt;7.76.1-26.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849947" version="1" comment="libcurl is &lt;7.76.1-26.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849948" version="1" comment="libcurl-devel is &lt;7.76.1-26.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849949" version="1" comment="libcurl-minimal is &lt;7.76.1-26.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850276" version="1" comment="openssh is &lt;8.7p1-34.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850277" version="1" comment="openssh-askpass is &lt;8.7p1-34.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850278" version="1" comment="openssh-clients is &lt;8.7p1-34.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850279" version="1" comment="openssh-keycat is &lt;8.7p1-34.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850280" version="1" comment="openssh-server is &lt;8.7p1-34.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850281" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.34.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849886" version="1" comment="go-toolset is &lt;1.20.12-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849887" version="1" comment="golang is &lt;1.20.12-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849888" version="1" comment="golang-bin is &lt;1.20.12-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849889" version="1" comment="golang-docs is &lt;1.20.12-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849890" version="1" comment="golang-misc is &lt;1.20.12-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849891" version="1" comment="golang-src is &lt;1.20.12-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849892" version="1" comment="golang-tests is &lt;1.20.12-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851381" version="1" comment="tomcat is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851382" version="1" comment="tomcat-admin-webapps is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851383" version="1" comment="tomcat-docs-webapp is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851384" version="1" comment="tomcat-el-3.0-api is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851385" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851386" version="1" comment="tomcat-lib is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851387" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851388" version="1" comment="tomcat-webapps is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850282" version="1" comment="keylime is &lt;7.3.0-13.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850283" version="1" comment="keylime-base is &lt;7.3.0-13.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850284" version="1" comment="keylime-registrar is &lt;7.3.0-13.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850285" version="1" comment="keylime-selinux is &lt;7.3.0-13.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850286" version="1" comment="keylime-tenant is &lt;7.3.0-13.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850287" version="1" comment="keylime-verifier is &lt;7.3.0-13.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850288" version="1" comment="python3-keylime is &lt;7.3.0-13.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858487" version="1" comment="mysql is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858488" version="1" comment="mysql-common is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858489" version="1" comment="mysql-devel is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858490" version="1" comment="mysql-errmsg is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858491" version="1" comment="mysql-libs is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858492" version="1" comment="mysql-server is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858493" version="1" comment="mysql-test is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850289" version="1" comment="haproxy is &lt;2.4.22-3.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850290" version="1" comment="rear is &lt;2.6-21.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850291" version="1" comment="skopeo is &lt;1.13.3-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850292" version="1" comment="skopeo-tests is &lt;1.13.3-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850293" version="1" comment="buildah is &lt;1.31.4-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850294" version="1" comment="buildah-tests is &lt;1.31.4-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851389" version="1" comment="opencryptoki is &lt;3.21.0-9.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851390" version="1" comment="opencryptoki-devel is &lt;3.21.0-9.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851391" version="1" comment="opencryptoki-icsftok is &lt;3.21.0-9.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851392" version="1" comment="opencryptoki-libs is &lt;3.21.0-9.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851393" version="1" comment="opencryptoki-swtok is &lt;3.21.0-9.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851394" version="1" comment="bpftool is &lt;7.2.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851395" version="1" comment="kernel is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851396" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-362.24.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851397" version="1" comment="kernel-core is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851398" version="1" comment="kernel-cross-headers is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851399" version="1" comment="kernel-debug is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851400" version="1" comment="kernel-debug-core is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851403" version="1" comment="kernel-debug-modules is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851404" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851405" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851406" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851409" version="1" comment="kernel-doc is &lt;5.14.0-362.24.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851410" version="1" comment="kernel-headers is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851411" version="1" comment="kernel-modules is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851412" version="1" comment="kernel-modules-core is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851413" version="1" comment="kernel-modules-extra is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851414" version="1" comment="kernel-tools is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851415" version="1" comment="kernel-tools-libs is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851417" version="1" comment="kernel-uki-virt is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851418" version="1" comment="libperf is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851419" version="1" comment="perf is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851420" version="1" comment="python3-perf is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851421" version="1" comment="rtla is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851422" version="1" comment="rv is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872225" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.17-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872226" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.17-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872227" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.17-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872228" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.17-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872229" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.17-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872230" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.117-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872231" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.117-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872232" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.17-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872233" version="1" comment="dotnet-templates-7.0 is &lt;7.0.117-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872234" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872235" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872236" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872237" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872238" version="1" comment="dotnet-host is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872239" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872240" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872241" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872242" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.103-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872243" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.103-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872244" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.103-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872245" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872246" version="1" comment="dotnet-templates-8.0 is &lt;8.0.103-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872247" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.103-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851423" version="1" comment="dnsmasq is &lt;2.85-14.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851424" version="1" comment="dnsmasq-utils is &lt;2.85-14.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851786" version="1" comment="squid is &lt;5.5-6.el9_3.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851819" version="1" comment="postgresql-jdbc is &lt;42.2.28-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851938" version="1" comment="nodejs is &lt;16.20.2-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851939" version="1" comment="nodejs-docs is &lt;16.20.2-4.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851940" version="1" comment="nodejs-full-i18n is &lt;16.20.2-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851941" version="1" comment="nodejs-libs is &lt;16.20.2-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851942" version="1" comment="npm is &lt;8.19.4-1.16.20.2.4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851820" version="1" comment="go-toolset is &lt;1.20.12-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851821" version="1" comment="golang is &lt;1.20.12-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851822" version="1" comment="golang-bin is &lt;1.20.12-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851823" version="1" comment="golang-docs is &lt;1.20.12-2.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851824" version="1" comment="golang-misc is &lt;1.20.12-2.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851825" version="1" comment="golang-src is &lt;1.20.12-2.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851826" version="1" comment="golang-tests is &lt;1.20.12-2.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851986" version="1" comment="firefox is &lt;115.9.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851987" version="1" comment="firefox-x11 is &lt;115.9.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851988" version="1" comment="thunderbird is &lt;115.9.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851977" version="1" comment="grafana is &lt;9.2.10-8.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851978" version="1" comment="grafana-pcp is &lt;5.1.1-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851979" version="1" comment="nodejs is &lt;18.19.1-1.module+el9.3.0+21388+22892fb9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851980" version="1" comment="nodejs-devel is &lt;18.19.1-1.module+el9.3.0+21388+22892fb9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851981" version="1" comment="nodejs-docs is &lt;18.19.1-1.module+el9.3.0+21388+22892fb9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851982" version="1" comment="nodejs-full-i18n is &lt;18.19.1-1.module+el9.3.0+21388+22892fb9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851983" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.3.0+19762+d716bf3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851984" version="1" comment="npm is &lt;10.2.4-1.18.19.1.1.module+el9.3.0+21388+22892fb9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851989" version="1" comment="expat is &lt;2.5.0-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851990" version="1" comment="expat-devel is &lt;2.5.0-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872248" version="1" comment="ruby is &lt;3.1.4-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872249" version="1" comment="ruby-bundled-gems is &lt;3.1.4-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872250" version="1" comment="ruby-default-gems is &lt;3.1.4-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872251" version="1" comment="ruby-devel is &lt;3.1.4-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872252" version="1" comment="ruby-doc is &lt;3.1.4-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872253" version="1" comment="ruby-libs is &lt;3.1.4-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872254" version="1" comment="rubygem-bigdecimal is &lt;3.1.1-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872255" version="1" comment="rubygem-bundler is &lt;2.3.26-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872256" version="1" comment="rubygem-io-console is &lt;0.5.11-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872257" version="1" comment="rubygem-irb is &lt;1.4.1-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872258" version="1" comment="rubygem-json is &lt;2.6.1-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872259" version="1" comment="rubygem-minitest is &lt;5.15.0-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872264" version="1" comment="rubygem-power_assert is &lt;2.0.1-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872265" version="1" comment="rubygem-psych is &lt;4.0.4-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872266" version="1" comment="rubygem-rake is &lt;13.0.6-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872267" version="1" comment="rubygem-rbs is &lt;2.7.0-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872268" version="1" comment="rubygem-rdoc is &lt;6.4.0-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872269" version="1" comment="rubygem-rexml is &lt;3.2.5-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872270" version="1" comment="rubygem-rss is &lt;0.2.9-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872271" version="1" comment="rubygem-test-unit is &lt;3.5.3-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872272" version="1" comment="rubygem-typeprof is &lt;0.21.3-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872273" version="1" comment="rubygems is &lt;3.3.26-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872274" version="1" comment="rubygems-devel is &lt;3.3.26-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853717" version="1" comment="nodejs is &lt;20.11.1-1.module+el9.3.0+21385+bac43d5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853718" version="1" comment="nodejs-devel is &lt;20.11.1-1.module+el9.3.0+21385+bac43d5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853719" version="1" comment="nodejs-docs is &lt;20.11.1-1.module+el9.3.0+21385+bac43d5a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853720" version="1" comment="nodejs-full-i18n is &lt;20.11.1-1.module+el9.3.0+21385+bac43d5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853721" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.3.0.z+20478+84a9f781 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853722" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.3.0+19518+63aad52d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853723" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.3.0+19518+63aad52d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853724" version="1" comment="npm is &lt;10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853725" version="1" comment="varnish is &lt;6.6.2-4.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853726" version="1" comment="varnish-devel is &lt;6.6.2-4.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853727" version="1" comment="varnish-docs is &lt;6.6.2-4.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853728" version="1" comment="less is &lt;590-3.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854107" version="1" comment="python3-unbound is &lt;1.16.2-3.el9_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854108" version="1" comment="unbound is &lt;1.16.2-3.el9_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854109" version="1" comment="unbound-devel is &lt;1.16.2-3.el9_3.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854110" version="1" comment="unbound-libs is &lt;1.16.2-3.el9_3.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854679" version="1" comment="bind is &lt;9.16.23-14.el9_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854680" version="1" comment="bind-chroot is &lt;9.16.23-14.el9_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854681" version="1" comment="bind-devel is &lt;9.16.23-14.el9_3.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854682" version="1" comment="bind-dnssec-doc is &lt;9.16.23-14.el9_3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854683" version="1" comment="bind-dnssec-utils is &lt;9.16.23-14.el9_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854684" version="1" comment="bind-doc is &lt;9.16.23-14.el9_3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854685" version="1" comment="bind-dyndb-ldap is &lt;11.9-8.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854686" version="1" comment="bind-libs is &lt;9.16.23-14.el9_3.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854687" version="1" comment="bind-license is &lt;9.16.23-14.el9_3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854688" version="1" comment="bind-utils is &lt;9.16.23-14.el9_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854689" version="1" comment="python3-bind is &lt;9.16.23-14.el9_3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858428" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858429" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.412.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859962" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.412.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859963" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.412.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858430" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858431" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858432" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858433" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858434" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858435" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858436" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858437" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858438" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858439" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858440" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.412.b08-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858441" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.412.b08-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858442" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858443" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858444" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858445" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856130" version="1" comment="java-11-openjdk is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856131" version="1" comment="java-11-openjdk-demo is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856132" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856133" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856134" version="1" comment="java-11-openjdk-devel is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856135" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856136" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856137" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856138" version="1" comment="java-11-openjdk-headless is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856139" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856140" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856141" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856142" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856143" version="1" comment="java-11-openjdk-jmods is &lt;11.0.23.0.9-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856144" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856145" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856146" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856147" version="1" comment="java-11-openjdk-src is &lt;11.0.23.0.9-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856148" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856149" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856150" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.23.0.9-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856151" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856152" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855576" version="1" comment="java-17-openjdk is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855577" version="1" comment="java-17-openjdk-demo is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855578" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855579" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855580" version="1" comment="java-17-openjdk-devel is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855581" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855582" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855583" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855584" version="1" comment="java-17-openjdk-headless is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855585" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855586" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855587" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855588" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855589" version="1" comment="java-17-openjdk-jmods is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855590" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855591" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855592" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855593" version="1" comment="java-17-openjdk-src is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855594" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855595" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855596" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855597" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855598" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855697" version="1" comment="java-21-openjdk is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855698" version="1" comment="java-21-openjdk-demo is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855699" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855700" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855701" version="1" comment="java-21-openjdk-devel is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855702" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855703" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855704" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855705" version="1" comment="java-21-openjdk-headless is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855706" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855707" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855708" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855709" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855710" version="1" comment="java-21-openjdk-jmods is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855711" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855712" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855713" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855714" version="1" comment="java-21-openjdk-src is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855715" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855716" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855717" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855718" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855719" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855310" version="1" comment="mod_http2 is &lt;1.15.19-5.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855311" version="1" comment="gnutls is &lt;3.7.6-23.el9_3.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855312" version="1" comment="gnutls-c++ is &lt;3.7.6-23.el9_3.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855313" version="1" comment="gnutls-dane is &lt;3.7.6-23.el9_3.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855314" version="1" comment="gnutls-devel is &lt;3.7.6-23.el9_3.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855315" version="1" comment="gnutls-utils is &lt;3.7.6-23.el9_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856159" version="1" comment="firefox is &lt;115.10.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856160" version="1" comment="firefox-x11 is &lt;115.10.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858072" version="1" comment="libreswan is &lt;4.12-1.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858073" version="1" comment="buildah is &lt;1.31.5-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858074" version="1" comment="buildah-tests is &lt;1.31.5-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867069" version="1" comment="git-lfs is &lt;3.2.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866424" version="1" comment="pcs is &lt;0.11.7-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866425" version="1" comment="pcs-snmp is &lt;0.11.7-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866426" version="1" comment="webkit2gtk3 is &lt;2.42.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866427" version="1" comment="webkit2gtk3-devel is &lt;2.42.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866428" version="1" comment="webkit2gtk3-jsc is &lt;2.42.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866429" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.42.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866430" version="1" comment="fence-agents-aliyun is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866431" version="1" comment="fence-agents-all is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866432" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866433" version="1" comment="fence-agents-apc is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866434" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866435" version="1" comment="fence-agents-aws is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866436" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866437" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866438" version="1" comment="fence-agents-brocade is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866439" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866440" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866441" version="1" comment="fence-agents-common is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866442" version="1" comment="fence-agents-compute is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866443" version="1" comment="fence-agents-drac5 is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866444" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866445" version="1" comment="fence-agents-emerson is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866446" version="1" comment="fence-agents-eps is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866447" version="1" comment="fence-agents-gce is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866448" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866449" version="1" comment="fence-agents-hpblade is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866450" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866451" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866452" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866453" version="1" comment="fence-agents-ifmib is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866454" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866455" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866456" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866457" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866458" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866459" version="1" comment="fence-agents-ipdu is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866460" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866461" version="1" comment="fence-agents-kdump is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866462" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866463" version="1" comment="fence-agents-mpath is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866464" version="1" comment="fence-agents-openstack is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866465" version="1" comment="fence-agents-redfish is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866466" version="1" comment="fence-agents-rhevm is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866467" version="1" comment="fence-agents-rsa is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866468" version="1" comment="fence-agents-rsb is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866469" version="1" comment="fence-agents-sbd is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866470" version="1" comment="fence-agents-scsi is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866471" version="1" comment="fence-agents-virsh is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866472" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866473" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866474" version="1" comment="fence-agents-wti is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866475" version="1" comment="fence-virt is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866476" version="1" comment="fence-virtd is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866477" version="1" comment="fence-virtd-cpg is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866478" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866479" version="1" comment="fence-virtd-multicast is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866480" version="1" comment="fence-virtd-serial is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866481" version="1" comment="fence-virtd-tcp is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866482" version="1" comment="ha-cloud-support is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872275" version="1" comment="qemu-guest-agent is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872276" version="1" comment="qemu-img is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872277" version="1" comment="qemu-kvm is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872278" version="1" comment="qemu-kvm-audio-pa is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872279" version="1" comment="qemu-kvm-block-blkio is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872280" version="1" comment="qemu-kvm-block-curl is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872281" version="1" comment="qemu-kvm-block-rbd is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872282" version="1" comment="qemu-kvm-common is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872283" version="1" comment="qemu-kvm-core is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872284" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872285" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872286" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872287" version="1" comment="qemu-kvm-device-usb-host is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872288" version="1" comment="qemu-kvm-device-usb-redirect is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872289" version="1" comment="qemu-kvm-docs is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872290" version="1" comment="qemu-kvm-tools is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872291" version="1" comment="qemu-kvm-ui-egl-headless is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872292" version="1" comment="qemu-kvm-ui-opengl is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872293" version="1" comment="qemu-pr-helper is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866483" version="1" comment="LibRaw is &lt;0.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866484" version="1" comment="LibRaw-devel is &lt;0.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866485" version="1" comment="libX11 is &lt;1.7.0-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866486" version="1" comment="libX11-common is &lt;1.7.0-9.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866487" version="1" comment="libX11-devel is &lt;1.7.0-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866488" version="1" comment="libX11-xcb is &lt;1.7.0-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866489" version="1" comment="libXpm is &lt;3.5.13-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866490" version="1" comment="libXpm-devel is &lt;3.5.13-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868940" version="1" comment="ipa-client is &lt;4.11.0-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868941" version="1" comment="ipa-client-common is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868942" version="1" comment="ipa-client-epn is &lt;4.11.0-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868943" version="1" comment="ipa-client-samba is &lt;4.11.0-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868944" version="1" comment="ipa-common is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868945" version="1" comment="ipa-selinux is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868946" version="1" comment="ipa-server is &lt;4.11.0-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868947" version="1" comment="ipa-server-common is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868948" version="1" comment="ipa-server-dns is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868949" version="1" comment="ipa-server-trust-ad is &lt;4.11.0-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868950" version="1" comment="python3-ipaclient is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868951" version="1" comment="python3-ipalib is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868952" version="1" comment="python3-ipaserver is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868953" version="1" comment="python3-ipatests is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867211" version="1" comment="frr is &lt;8.5.3-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867212" version="1" comment="frr-selinux is &lt;8.5.3-4.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866491" version="1" comment="python3.11-urllib3 is &lt;1.26.12-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866492" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-24.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866493" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-24.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866494" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-24.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866495" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-24.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866496" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-24.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866497" version="1" comment="xorg-x11-server-common is &lt;1.20.11-24.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866498" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-24.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866499" version="1" comment="xorg-x11-server-source is &lt;1.20.11-24.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866500" version="1" comment="xorg-x11-server-Xwayland is &lt;22.1.9-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871419" version="1" comment="runc is &lt;1.1.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866501" version="1" comment="libsndfile is &lt;1.0.31-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866502" version="1" comment="libsndfile-devel is &lt;1.0.31-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866503" version="1" comment="libsndfile-utils is &lt;1.0.31-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867213" version="1" comment="podman is &lt;4.9.4-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867214" version="1" comment="podman-docker is &lt;4.9.4-0.1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867215" version="1" comment="podman-plugins is &lt;4.9.4-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867216" version="1" comment="podman-remote is &lt;4.9.4-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867217" version="1" comment="podman-tests is &lt;4.9.4-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866504" version="1" comment="pmix is &lt;3.2.3-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866505" version="1" comment="pmix-devel is &lt;3.2.3-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866506" version="1" comment="pmix-pmi is &lt;3.2.3-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866507" version="1" comment="pmix-pmi-devel is &lt;3.2.3-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866508" version="1" comment="pmix-tools is &lt;3.2.3-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866509" version="1" comment="libnbd is &lt;1.18.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866510" version="1" comment="libnbd-bash-completion is &lt;1.18.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866511" version="1" comment="libnbd-devel is &lt;1.18.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866512" version="1" comment="nbdfuse is &lt;1.18.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866513" version="1" comment="ocaml-libnbd is &lt;1.18.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866514" version="1" comment="ocaml-libnbd-devel is &lt;1.18.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866515" version="1" comment="python3-libnbd is &lt;1.18.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866516" version="1" comment="freerdp is &lt;2.11.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866517" version="1" comment="freerdp-devel is &lt;2.11.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866518" version="1" comment="freerdp-libs is &lt;2.11.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866519" version="1" comment="libwinpr is &lt;2.11.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866520" version="1" comment="libwinpr-devel is &lt;2.11.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866521" version="1" comment="tcpdump is &lt;4.99.0-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872738" version="1" comment="pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872739" version="1" comment="pcp-conf is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872740" version="1" comment="pcp-devel is &lt;6.2.0-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872741" version="1" comment="pcp-doc is &lt;6.2.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872742" version="1" comment="pcp-export-pcp2elasticsearch is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872743" version="1" comment="pcp-export-pcp2graphite is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872744" version="1" comment="pcp-export-pcp2influxdb is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872745" version="1" comment="pcp-export-pcp2json is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872746" version="1" comment="pcp-export-pcp2spark is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872747" version="1" comment="pcp-export-pcp2xml is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872748" version="1" comment="pcp-export-pcp2zabbix is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872749" version="1" comment="pcp-export-zabbix-agent is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872750" version="1" comment="pcp-geolocate is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872751" version="1" comment="pcp-gui is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872752" version="1" comment="pcp-import-collectl2pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872753" version="1" comment="pcp-import-ganglia2pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872754" version="1" comment="pcp-import-iostat2pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872755" version="1" comment="pcp-import-mrtg2pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872756" version="1" comment="pcp-import-sar2pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872757" version="1" comment="pcp-libs is &lt;6.2.0-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872758" version="1" comment="pcp-libs-devel is &lt;6.2.0-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872759" version="1" comment="pcp-pmda-activemq is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872760" version="1" comment="pcp-pmda-apache is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872761" version="1" comment="pcp-pmda-bash is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872762" version="1" comment="pcp-pmda-bcc is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872763" version="1" comment="pcp-pmda-bind2 is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872764" version="1" comment="pcp-pmda-bonding is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872765" version="1" comment="pcp-pmda-bpf is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872766" version="1" comment="pcp-pmda-bpftrace is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872767" version="1" comment="pcp-pmda-cifs is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872768" version="1" comment="pcp-pmda-cisco is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872769" version="1" comment="pcp-pmda-dbping is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872770" version="1" comment="pcp-pmda-denki is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872771" version="1" comment="pcp-pmda-dm is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872772" version="1" comment="pcp-pmda-docker is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872773" version="1" comment="pcp-pmda-ds389 is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872774" version="1" comment="pcp-pmda-ds389log is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872775" version="1" comment="pcp-pmda-elasticsearch is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872776" version="1" comment="pcp-pmda-farm is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872777" version="1" comment="pcp-pmda-gfs2 is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872778" version="1" comment="pcp-pmda-gluster is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872779" version="1" comment="pcp-pmda-gpfs is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872780" version="1" comment="pcp-pmda-gpsd is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872781" version="1" comment="pcp-pmda-hacluster is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872782" version="1" comment="pcp-pmda-haproxy is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872783" version="1" comment="pcp-pmda-infiniband is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872784" version="1" comment="pcp-pmda-json is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872785" version="1" comment="pcp-pmda-libvirt is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872786" version="1" comment="pcp-pmda-lio is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872787" version="1" comment="pcp-pmda-lmsensors is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872788" version="1" comment="pcp-pmda-logger is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872789" version="1" comment="pcp-pmda-lustre is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872790" version="1" comment="pcp-pmda-lustrecomm is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872791" version="1" comment="pcp-pmda-mailq is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872792" version="1" comment="pcp-pmda-memcache is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872793" version="1" comment="pcp-pmda-mic is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872794" version="1" comment="pcp-pmda-mongodb is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872795" version="1" comment="pcp-pmda-mounts is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872796" version="1" comment="pcp-pmda-mssql is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872797" version="1" comment="pcp-pmda-mysql is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872798" version="1" comment="pcp-pmda-named is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872799" version="1" comment="pcp-pmda-netcheck is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872800" version="1" comment="pcp-pmda-netfilter is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872801" version="1" comment="pcp-pmda-news is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872802" version="1" comment="pcp-pmda-nfsclient is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872803" version="1" comment="pcp-pmda-nginx is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872804" version="1" comment="pcp-pmda-nvidia-gpu is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872805" version="1" comment="pcp-pmda-openmetrics is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872806" version="1" comment="pcp-pmda-openvswitch is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872807" version="1" comment="pcp-pmda-oracle is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872808" version="1" comment="pcp-pmda-pdns is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872809" version="1" comment="pcp-pmda-perfevent is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872810" version="1" comment="pcp-pmda-podman is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872811" version="1" comment="pcp-pmda-postfix is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872812" version="1" comment="pcp-pmda-postgresql is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872813" version="1" comment="pcp-pmda-rabbitmq is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872814" version="1" comment="pcp-pmda-redis is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872815" version="1" comment="pcp-pmda-resctrl is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872816" version="1" comment="pcp-pmda-roomtemp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872817" version="1" comment="pcp-pmda-rsyslog is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872818" version="1" comment="pcp-pmda-samba is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872819" version="1" comment="pcp-pmda-sendmail is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872820" version="1" comment="pcp-pmda-shping is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872821" version="1" comment="pcp-pmda-slurm is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872822" version="1" comment="pcp-pmda-smart is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872823" version="1" comment="pcp-pmda-snmp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872824" version="1" comment="pcp-pmda-sockets is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872825" version="1" comment="pcp-pmda-statsd is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872826" version="1" comment="pcp-pmda-summary is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872827" version="1" comment="pcp-pmda-systemd is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872828" version="1" comment="pcp-pmda-trace is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872829" version="1" comment="pcp-pmda-unbound is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872830" version="1" comment="pcp-pmda-weblog is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872831" version="1" comment="pcp-pmda-zimbra is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872832" version="1" comment="pcp-pmda-zswap is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872833" version="1" comment="pcp-selinux is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872834" version="1" comment="pcp-system-tools is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872835" version="1" comment="pcp-zeroconf is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872836" version="1" comment="perl-PCP-LogImport is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872837" version="1" comment="perl-PCP-LogSummary is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872838" version="1" comment="perl-PCP-MMV is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872839" version="1" comment="perl-PCP-PMDA is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872840" version="1" comment="python3-pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866522" version="1" comment="motif is &lt;2.3.4-28.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866523" version="1" comment="motif-devel is &lt;2.3.4-28.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866524" version="1" comment="perl is &lt;5.32.1-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866525" version="1" comment="perl-Attribute-Handlers is &lt;1.01-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866526" version="1" comment="perl-AutoLoader is &lt;5.74-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866527" version="1" comment="perl-AutoSplit is &lt;5.74-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866528" version="1" comment="perl-B is &lt;1.80-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866529" version="1" comment="perl-Benchmark is &lt;1.23-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866530" version="1" comment="perl-Class-Struct is &lt;0.66-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866531" version="1" comment="perl-Config-Extensions is &lt;0.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866532" version="1" comment="perl-DBM_Filter is &lt;0.06-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866533" version="1" comment="perl-Devel-Peek is &lt;1.28-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866534" version="1" comment="perl-Devel-SelfStubber is &lt;1.06-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866535" version="1" comment="perl-DirHandle is &lt;1.05-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866536" version="1" comment="perl-Dumpvalue is &lt;2.27-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866537" version="1" comment="perl-DynaLoader is &lt;1.47-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866538" version="1" comment="perl-English is &lt;1.11-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866539" version="1" comment="perl-Errno is &lt;1.30-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866540" version="1" comment="perl-ExtUtils-Constant is &lt;0.25-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866541" version="1" comment="perl-ExtUtils-Embed is &lt;1.35-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866542" version="1" comment="perl-ExtUtils-Miniperl is &lt;1.09-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866543" version="1" comment="perl-Fcntl is &lt;1.13-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866544" version="1" comment="perl-File-Basename is &lt;2.85-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866545" version="1" comment="perl-File-Compare is &lt;1.100.600-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866546" version="1" comment="perl-File-Copy is &lt;2.34-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866547" version="1" comment="perl-File-DosGlob is &lt;1.12-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866548" version="1" comment="perl-File-Find is &lt;1.37-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866549" version="1" comment="perl-File-stat is &lt;1.09-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866550" version="1" comment="perl-FileCache is &lt;1.10-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866551" version="1" comment="perl-FileHandle is &lt;2.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866552" version="1" comment="perl-FindBin is &lt;1.51-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866553" version="1" comment="perl-GDBM_File is &lt;1.18-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866554" version="1" comment="perl-Getopt-Std is &lt;1.12-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866555" version="1" comment="perl-Hash-Util is &lt;0.23-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866556" version="1" comment="perl-Hash-Util-FieldHash is &lt;1.20-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866557" version="1" comment="perl-I18N-Collate is &lt;1.02-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866558" version="1" comment="perl-I18N-LangTags is &lt;0.44-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866559" version="1" comment="perl-I18N-Langinfo is &lt;0.19-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866560" version="1" comment="perl-IO is &lt;1.43-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866561" version="1" comment="perl-IPC-Open3 is &lt;1.21-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866562" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866563" version="1" comment="perl-Math-Complex is &lt;1.59-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866564" version="1" comment="perl-Memoize is &lt;1.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866565" version="1" comment="perl-Module-Loaded is &lt;0.08-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866566" version="1" comment="perl-NDBM_File is &lt;1.15-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866567" version="1" comment="perl-NEXT is &lt;0.67-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866568" version="1" comment="perl-Net is &lt;1.02-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866569" version="1" comment="perl-ODBM_File is &lt;1.16-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866570" version="1" comment="perl-Opcode is &lt;1.48-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866571" version="1" comment="perl-POSIX is &lt;1.94-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866572" version="1" comment="perl-Pod-Functions is &lt;1.13-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866573" version="1" comment="perl-Pod-Html is &lt;1.25-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866574" version="1" comment="perl-Safe is &lt;2.41-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866575" version="1" comment="perl-Search-Dict is &lt;1.07-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866576" version="1" comment="perl-SelectSaver is &lt;1.02-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866577" version="1" comment="perl-SelfLoader is &lt;1.26-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866578" version="1" comment="perl-Symbol is &lt;1.08-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866579" version="1" comment="perl-Sys-Hostname is &lt;1.23-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866580" version="1" comment="perl-Term-Complete is &lt;1.403-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866581" version="1" comment="perl-Term-ReadLine is &lt;1.17-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866582" version="1" comment="perl-Test is &lt;1.31-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866583" version="1" comment="perl-Text-Abbrev is &lt;1.02-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866584" version="1" comment="perl-Thread is &lt;3.05-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866585" version="1" comment="perl-Thread-Semaphore is &lt;2.13-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866586" version="1" comment="perl-Tie is &lt;4.6-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866587" version="1" comment="perl-Tie-File is &lt;1.06-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866588" version="1" comment="perl-Tie-Memoize is &lt;1.1-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866589" version="1" comment="perl-Time is &lt;1.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866590" version="1" comment="perl-Time-Piece is &lt;1.3401-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866591" version="1" comment="perl-Unicode-UCD is &lt;0.75-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866592" version="1" comment="perl-User-pwent is &lt;1.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866593" version="1" comment="perl-autouse is &lt;1.11-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866594" version="1" comment="perl-base is &lt;2.27-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866595" version="1" comment="perl-blib is &lt;1.07-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866596" version="1" comment="perl-debugger is &lt;1.56-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866597" version="1" comment="perl-deprecate is &lt;0.04-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866598" version="1" comment="perl-devel is &lt;5.32.1-481.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866599" version="1" comment="perl-diagnostics is &lt;1.37-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866600" version="1" comment="perl-doc is &lt;5.32.1-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866601" version="1" comment="perl-encoding-warnings is &lt;0.13-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866602" version="1" comment="perl-fields is &lt;2.27-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866603" version="1" comment="perl-filetest is &lt;1.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866604" version="1" comment="perl-if is &lt;0.60.800-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866605" version="1" comment="perl-interpreter is &lt;5.32.1-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866606" version="1" comment="perl-less is &lt;0.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866607" version="1" comment="perl-lib is &lt;0.65-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866608" version="1" comment="perl-libnetcfg is &lt;5.32.1-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866609" version="1" comment="perl-libs is &lt;5.32.1-481.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866610" version="1" comment="perl-locale is &lt;1.09-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866611" version="1" comment="perl-macros is &lt;5.32.1-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866612" version="1" comment="perl-meta-notation is &lt;5.32.1-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866613" version="1" comment="perl-mro is &lt;1.23-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866614" version="1" comment="perl-open is &lt;1.12-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866615" version="1" comment="perl-overload is &lt;1.31-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866616" version="1" comment="perl-overloading is &lt;0.02-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866617" version="1" comment="perl-ph is &lt;5.32.1-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866618" version="1" comment="perl-sigtrap is &lt;1.09-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866619" version="1" comment="perl-sort is &lt;2.04-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866620" version="1" comment="perl-subs is &lt;1.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866621" version="1" comment="perl-utils is &lt;5.32.1-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866622" version="1" comment="perl-vars is &lt;1.05-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866623" version="1" comment="perl-vmsish is &lt;1.04-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868719" version="1" comment="libvirt is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868720" version="1" comment="libvirt-client is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868721" version="1" comment="libvirt-client-qemu is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868722" version="1" comment="libvirt-daemon is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868723" version="1" comment="libvirt-daemon-common is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868724" version="1" comment="libvirt-daemon-config-network is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868725" version="1" comment="libvirt-daemon-config-nwfilter is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868726" version="1" comment="libvirt-daemon-driver-interface is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868727" version="1" comment="libvirt-daemon-driver-network is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868728" version="1" comment="libvirt-daemon-driver-nodedev is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868729" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868730" version="1" comment="libvirt-daemon-driver-qemu is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868731" version="1" comment="libvirt-daemon-driver-secret is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868732" version="1" comment="libvirt-daemon-driver-storage is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868733" version="1" comment="libvirt-daemon-driver-storage-core is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868734" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868735" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868736" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868737" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868738" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868739" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868740" version="1" comment="libvirt-daemon-kvm is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868741" version="1" comment="libvirt-daemon-lock is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868742" version="1" comment="libvirt-daemon-log is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868743" version="1" comment="libvirt-daemon-plugin-lockd is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868744" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868745" version="1" comment="libvirt-daemon-proxy is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868746" version="1" comment="libvirt-devel is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868747" version="1" comment="libvirt-docs is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868748" version="1" comment="libvirt-libs is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868749" version="1" comment="libvirt-nss is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868530" version="1" comment="skopeo is &lt;1.14.3-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868531" version="1" comment="skopeo-tests is &lt;1.14.3-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866624" version="1" comment="buildah is &lt;1.33.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866625" version="1" comment="buildah-tests is &lt;1.33.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876437" version="1" comment="ansible-core is &lt;2.14.14-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876438" version="1" comment="ansible-test is &lt;2.14.14-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866626" version="1" comment="edk2-ovmf is &lt;20231122-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866627" version="1" comment="edk2-tools is &lt;20231122-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866628" version="1" comment="edk2-tools-doc is &lt;20231122-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866629" version="1" comment="containernetworking-plugins is &lt;1.4.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866630" version="1" comment="qt5-qtbase is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866631" version="1" comment="qt5-qtbase-common is &lt;5.15.9-9.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866632" version="1" comment="qt5-qtbase-devel is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866633" version="1" comment="qt5-qtbase-examples is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866634" version="1" comment="qt5-qtbase-gui is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866635" version="1" comment="qt5-qtbase-mysql is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866636" version="1" comment="qt5-qtbase-odbc is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866637" version="1" comment="qt5-qtbase-postgresql is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866638" version="1" comment="qt5-qtbase-private-devel is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866639" version="1" comment="qt5-qtbase-static is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866640" version="1" comment="httpd is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866641" version="1" comment="httpd-core is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866642" version="1" comment="httpd-devel is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866643" version="1" comment="httpd-filesystem is &lt;2.4.57-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866644" version="1" comment="httpd-manual is &lt;2.4.57-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866645" version="1" comment="httpd-tools is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866646" version="1" comment="mod_ldap is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866647" version="1" comment="mod_lua is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866648" version="1" comment="mod_proxy_html is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866649" version="1" comment="mod_session is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866650" version="1" comment="mod_ssl is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866651" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.22.1-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866652" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.22.1-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866653" version="1" comment="libtiff is &lt;4.4.0-12.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866654" version="1" comment="libtiff-devel is &lt;4.4.0-12.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866655" version="1" comment="libtiff-tools is &lt;4.4.0-12.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866656" version="1" comment="mutt is &lt;2.2.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866657" version="1" comment="python3.11 is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866658" version="1" comment="python3.11-debug is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866659" version="1" comment="python3.11-devel is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866660" version="1" comment="python3.11-idle is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866661" version="1" comment="python3.11-libs is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866662" version="1" comment="python3.11-test is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866663" version="1" comment="python3.11-tkinter is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866664" version="1" comment="libjpeg-turbo is &lt;2.0.90-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866665" version="1" comment="libjpeg-turbo-devel is &lt;2.0.90-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866666" version="1" comment="libjpeg-turbo-utils is &lt;2.0.90-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866667" version="1" comment="turbojpeg is &lt;2.0.90-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866668" version="1" comment="turbojpeg-devel is &lt;2.0.90-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866669" version="1" comment="tigervnc is &lt;1.13.1-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866670" version="1" comment="tigervnc-icons is &lt;1.13.1-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866671" version="1" comment="tigervnc-license is &lt;1.13.1-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866672" version="1" comment="tigervnc-selinux is &lt;1.13.1-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866673" version="1" comment="tigervnc-server is &lt;1.13.1-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866674" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866675" version="1" comment="tigervnc-server-module is &lt;1.13.1-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866676" version="1" comment="gstreamer1-plugins-base is &lt;1.22.1-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866677" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.22.1-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866678" version="1" comment="gstreamer1-plugins-base-tools is &lt;1.22.1-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866679" version="1" comment="gstreamer1-plugins-good is &lt;1.22.1-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866680" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.22.1-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866681" version="1" comment="python3.11-cryptography is &lt;37.0.2-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866682" version="1" comment="python3-jinja2 is &lt;2.11.3-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866683" version="1" comment="mingw-binutils-generic is &lt;2.41-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866684" version="1" comment="mingw-filesystem-base is &lt;148-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866685" version="1" comment="mingw-w64-tools is &lt;11.0.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866686" version="1" comment="mingw32-binutils is &lt;2.41-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866687" version="1" comment="mingw32-cpp is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866688" version="1" comment="mingw32-crt is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866689" version="1" comment="mingw32-filesystem is &lt;148-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866690" version="1" comment="mingw32-gcc is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866691" version="1" comment="mingw32-gcc-c++ is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866692" version="1" comment="mingw32-headers is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866693" version="1" comment="mingw32-libffi is &lt;3.4.4-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866694" version="1" comment="mingw32-libgcc is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866695" version="1" comment="mingw32-libstdc++ is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866696" version="1" comment="mingw32-winpthreads is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866697" version="1" comment="mingw32-winpthreads-static is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866698" version="1" comment="mingw32-zlib is &lt;1.3.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866699" version="1" comment="mingw32-zlib-static is &lt;1.3.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866700" version="1" comment="mingw64-binutils is &lt;2.41-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866701" version="1" comment="mingw64-cpp is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866702" version="1" comment="mingw64-crt is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866703" version="1" comment="mingw64-filesystem is &lt;148-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866704" version="1" comment="mingw64-gcc is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866705" version="1" comment="mingw64-gcc-c++ is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866706" version="1" comment="mingw64-headers is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866707" version="1" comment="mingw64-libffi is &lt;3.4.4-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866708" version="1" comment="mingw64-libgcc is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866709" version="1" comment="mingw64-libstdc++ is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866710" version="1" comment="mingw64-winpthreads is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866711" version="1" comment="mingw64-winpthreads-static is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866712" version="1" comment="mingw64-zlib is &lt;1.3.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866713" version="1" comment="mingw64-zlib-static is &lt;1.3.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866714" version="1" comment="freeglut is &lt;3.2.1-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866715" version="1" comment="freeglut-devel is &lt;3.2.1-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866716" version="1" comment="mod_http2 is &lt;2.0.26-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866717" version="1" comment="zziplib is &lt;0.13.71-11.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866718" version="1" comment="zziplib-devel is &lt;0.13.71-11.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866719" version="1" comment="zziplib-utils is &lt;0.13.71-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866720" version="1" comment="mod_jk is &lt;1.2.49-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866721" version="1" comment="mod_proxy_cluster is &lt;1.3.20-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870054" version="1" comment="bpftool is &lt;7.3.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870055" version="1" comment="kernel is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870056" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.13.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870057" version="1" comment="kernel-core is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870058" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870059" version="1" comment="kernel-debug is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870060" version="1" comment="kernel-debug-core is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870063" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870064" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870065" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870066" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870069" version="1" comment="kernel-doc is &lt;5.14.0-427.13.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870070" version="1" comment="kernel-headers is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870071" version="1" comment="kernel-modules is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870072" version="1" comment="kernel-modules-core is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870073" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870074" version="1" comment="kernel-tools is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870075" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870077" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870078" version="1" comment="libperf is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870079" version="1" comment="perf is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870080" version="1" comment="python3-perf is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870081" version="1" comment="rtla is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870082" version="1" comment="rv is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866722" version="1" comment="squashfs-tools is &lt;4.4-10.git1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866723" version="1" comment="harfbuzz is &lt;2.7.4-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866724" version="1" comment="harfbuzz-devel is &lt;2.7.4-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866725" version="1" comment="harfbuzz-icu is &lt;2.7.4-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866726" version="1" comment="avahi-glib is &lt;0.8-20.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866727" version="1" comment="avahi-tools is &lt;0.8-20.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866728" version="1" comment="exfatprogs is &lt;1.2.2-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866729" version="1" comment="pam is &lt;1.5.1-19.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866730" version="1" comment="pam-devel is &lt;1.5.1-19.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866731" version="1" comment="pam-docs is &lt;1.5.1-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867976" version="1" comment="openssl is &lt;3.0.7-27.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867977" version="1" comment="openssl-devel is &lt;3.0.7-27.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867978" version="1" comment="openssl-fips-provider is &lt;3.0.7-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867979" version="1" comment="openssl-libs is &lt;3.0.7-27.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867980" version="1" comment="openssl-perl is &lt;3.0.7-27.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872294" version="1" comment="grub2-common is &lt;2.06-77.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872295" version="1" comment="grub2-efi-x64 is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872296" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872297" version="1" comment="grub2-efi-x64-modules is &lt;2.06-77.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872298" version="1" comment="grub2-pc is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872299" version="1" comment="grub2-pc-modules is &lt;2.06-77.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872300" version="1" comment="grub2-tools is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872301" version="1" comment="grub2-tools-efi is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872302" version="1" comment="grub2-tools-extra is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872303" version="1" comment="grub2-tools-minimal is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866732" version="1" comment="rhel-net-naming-sysattrs is &lt;252-32.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866733" version="1" comment="systemd is &lt;252-32.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866734" version="1" comment="systemd-boot-unsigned is &lt;252-32.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866735" version="1" comment="systemd-container is &lt;252-32.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866736" version="1" comment="systemd-devel is &lt;252-32.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866737" version="1" comment="systemd-journal-remote is &lt;252-32.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866738" version="1" comment="systemd-libs is &lt;252-32.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866739" version="1" comment="systemd-oomd is &lt;252-32.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866740" version="1" comment="systemd-pam is &lt;252-32.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866741" version="1" comment="systemd-resolved is &lt;252-32.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866742" version="1" comment="systemd-rpm-macros is &lt;252-32.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866743" version="1" comment="systemd-udev is &lt;252-32.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866744" version="1" comment="traceroute is &lt;2.1.0-18.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866745" version="1" comment="libssh is &lt;0.10.4-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866746" version="1" comment="libssh-config is &lt;0.10.4-13.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866747" version="1" comment="libssh-devel is &lt;0.10.4-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866748" version="1" comment="file is &lt;5.39-16.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866749" version="1" comment="file-devel is &lt;5.39-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866750" version="1" comment="file-libs is &lt;5.39-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866751" version="1" comment="python3-file-magic is &lt;5.39-16.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866752" version="1" comment="wpa_supplicant is &lt;2.10-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866753" version="1" comment="mingw32-pixman is &lt;0.42.2-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866754" version="1" comment="mingw64-pixman is &lt;0.42.2-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868750" version="1" comment="mingw32-glib2 is &lt;2.78.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868751" version="1" comment="mingw32-glib2-static is &lt;2.78.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868752" version="1" comment="mingw64-glib2 is &lt;2.78.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868753" version="1" comment="mingw64-glib2-static is &lt;2.78.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867218" version="1" comment="podman is &lt;4.9.4-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867219" version="1" comment="podman-docker is &lt;4.9.4-3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867220" version="1" comment="podman-plugins is &lt;4.9.4-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867221" version="1" comment="podman-remote is &lt;4.9.4-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867222" version="1" comment="podman-tests is &lt;4.9.4-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868754" version="1" comment="skopeo is &lt;1.14.3-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868755" version="1" comment="skopeo-tests is &lt;1.14.3-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866755" version="1" comment="buildah is &lt;1.33.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866756" version="1" comment="buildah-tests is &lt;1.33.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867223" version="1" comment="bind is &lt;9.16.23-18.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867224" version="1" comment="bind-chroot is &lt;9.16.23-18.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867225" version="1" comment="bind-devel is &lt;9.16.23-18.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867226" version="1" comment="bind-dnssec-doc is &lt;9.16.23-18.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867227" version="1" comment="bind-dnssec-utils is &lt;9.16.23-18.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867228" version="1" comment="bind-doc is &lt;9.16.23-18.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867229" version="1" comment="bind-dyndb-ldap is &lt;11.9-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867230" version="1" comment="bind-libs is &lt;9.16.23-18.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867231" version="1" comment="bind-license is &lt;9.16.23-18.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867232" version="1" comment="bind-utils is &lt;9.16.23-18.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867233" version="1" comment="python3-bind is &lt;9.16.23-18.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866757" version="1" comment="python3-jwcrypto is &lt;0.8-5.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868756" version="1" comment="libvirt is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868757" version="1" comment="libvirt-client is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868758" version="1" comment="libvirt-client-qemu is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868759" version="1" comment="libvirt-daemon is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868760" version="1" comment="libvirt-daemon-common is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868761" version="1" comment="libvirt-daemon-config-network is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868762" version="1" comment="libvirt-daemon-config-nwfilter is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868763" version="1" comment="libvirt-daemon-driver-interface is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868764" version="1" comment="libvirt-daemon-driver-network is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868765" version="1" comment="libvirt-daemon-driver-nodedev is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868766" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868767" version="1" comment="libvirt-daemon-driver-qemu is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868768" version="1" comment="libvirt-daemon-driver-secret is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868769" version="1" comment="libvirt-daemon-driver-storage is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868770" version="1" comment="libvirt-daemon-driver-storage-core is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868771" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868772" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868773" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868774" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868775" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868776" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868777" version="1" comment="libvirt-daemon-kvm is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868778" version="1" comment="libvirt-daemon-lock is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868779" version="1" comment="libvirt-daemon-log is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868780" version="1" comment="libvirt-daemon-plugin-lockd is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868781" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868782" version="1" comment="libvirt-daemon-proxy is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868783" version="1" comment="libvirt-devel is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868784" version="1" comment="libvirt-docs is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868785" version="1" comment="libvirt-libs is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868786" version="1" comment="libvirt-nss is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866758" version="1" comment="go-toolset is &lt;1.21.9-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866759" version="1" comment="golang is &lt;1.21.9-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866760" version="1" comment="golang-bin is &lt;1.21.9-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866761" version="1" comment="golang-docs is &lt;1.21.9-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866762" version="1" comment="golang-misc is &lt;1.21.9-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866763" version="1" comment="golang-src is &lt;1.21.9-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866764" version="1" comment="golang-tests is &lt;1.21.9-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866765" version="1" comment="mod_http2 is &lt;2.0.26-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866766" version="1" comment="libreswan is &lt;4.12-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872841" version="1" comment="pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872842" version="1" comment="pcp-conf is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872843" version="1" comment="pcp-devel is &lt;6.2.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872844" version="1" comment="pcp-doc is &lt;6.2.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872845" version="1" comment="pcp-export-pcp2elasticsearch is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872846" version="1" comment="pcp-export-pcp2graphite is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872847" version="1" comment="pcp-export-pcp2influxdb is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872848" version="1" comment="pcp-export-pcp2json is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872849" version="1" comment="pcp-export-pcp2spark is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872850" version="1" comment="pcp-export-pcp2xml is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872851" version="1" comment="pcp-export-pcp2zabbix is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872852" version="1" comment="pcp-export-zabbix-agent is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872853" version="1" comment="pcp-geolocate is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872854" version="1" comment="pcp-gui is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872855" version="1" comment="pcp-import-collectl2pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872856" version="1" comment="pcp-import-ganglia2pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872857" version="1" comment="pcp-import-iostat2pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872858" version="1" comment="pcp-import-mrtg2pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872859" version="1" comment="pcp-import-sar2pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872860" version="1" comment="pcp-libs is &lt;6.2.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872861" version="1" comment="pcp-libs-devel is &lt;6.2.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872862" version="1" comment="pcp-pmda-activemq is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872863" version="1" comment="pcp-pmda-apache is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872864" version="1" comment="pcp-pmda-bash is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872865" version="1" comment="pcp-pmda-bcc is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872866" version="1" comment="pcp-pmda-bind2 is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872867" version="1" comment="pcp-pmda-bonding is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872868" version="1" comment="pcp-pmda-bpf is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872869" version="1" comment="pcp-pmda-bpftrace is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872870" version="1" comment="pcp-pmda-cifs is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872871" version="1" comment="pcp-pmda-cisco is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872872" version="1" comment="pcp-pmda-dbping is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872873" version="1" comment="pcp-pmda-denki is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872874" version="1" comment="pcp-pmda-dm is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872875" version="1" comment="pcp-pmda-docker is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872876" version="1" comment="pcp-pmda-ds389 is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872877" version="1" comment="pcp-pmda-ds389log is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872878" version="1" comment="pcp-pmda-elasticsearch is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872879" version="1" comment="pcp-pmda-farm is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872880" version="1" comment="pcp-pmda-gfs2 is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872881" version="1" comment="pcp-pmda-gluster is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872882" version="1" comment="pcp-pmda-gpfs is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872883" version="1" comment="pcp-pmda-gpsd is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872884" version="1" comment="pcp-pmda-hacluster is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872885" version="1" comment="pcp-pmda-haproxy is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872886" version="1" comment="pcp-pmda-infiniband is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872887" version="1" comment="pcp-pmda-json is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872888" version="1" comment="pcp-pmda-libvirt is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872889" version="1" comment="pcp-pmda-lio is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872890" version="1" comment="pcp-pmda-lmsensors is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872891" version="1" comment="pcp-pmda-logger is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872892" version="1" comment="pcp-pmda-lustre is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872893" version="1" comment="pcp-pmda-lustrecomm is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872894" version="1" comment="pcp-pmda-mailq is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872895" version="1" comment="pcp-pmda-memcache is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872896" version="1" comment="pcp-pmda-mic is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872897" version="1" comment="pcp-pmda-mongodb is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872898" version="1" comment="pcp-pmda-mounts is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872899" version="1" comment="pcp-pmda-mssql is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872900" version="1" comment="pcp-pmda-mysql is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872901" version="1" comment="pcp-pmda-named is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872902" version="1" comment="pcp-pmda-netcheck is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872903" version="1" comment="pcp-pmda-netfilter is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872904" version="1" comment="pcp-pmda-news is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872905" version="1" comment="pcp-pmda-nfsclient is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872906" version="1" comment="pcp-pmda-nginx is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872907" version="1" comment="pcp-pmda-nvidia-gpu is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872908" version="1" comment="pcp-pmda-openmetrics is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872909" version="1" comment="pcp-pmda-openvswitch is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872910" version="1" comment="pcp-pmda-oracle is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872911" version="1" comment="pcp-pmda-pdns is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872912" version="1" comment="pcp-pmda-perfevent is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872913" version="1" comment="pcp-pmda-podman is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872914" version="1" comment="pcp-pmda-postfix is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872915" version="1" comment="pcp-pmda-postgresql is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872916" version="1" comment="pcp-pmda-rabbitmq is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872917" version="1" comment="pcp-pmda-redis is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872918" version="1" comment="pcp-pmda-resctrl is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872919" version="1" comment="pcp-pmda-roomtemp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872920" version="1" comment="pcp-pmda-rsyslog is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872921" version="1" comment="pcp-pmda-samba is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872922" version="1" comment="pcp-pmda-sendmail is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872923" version="1" comment="pcp-pmda-shping is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872924" version="1" comment="pcp-pmda-slurm is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872925" version="1" comment="pcp-pmda-smart is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872926" version="1" comment="pcp-pmda-snmp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872927" version="1" comment="pcp-pmda-sockets is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872928" version="1" comment="pcp-pmda-statsd is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872929" version="1" comment="pcp-pmda-summary is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872930" version="1" comment="pcp-pmda-systemd is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872931" version="1" comment="pcp-pmda-trace is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872932" version="1" comment="pcp-pmda-unbound is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872933" version="1" comment="pcp-pmda-weblog is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872934" version="1" comment="pcp-pmda-zimbra is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872935" version="1" comment="pcp-pmda-zswap is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872936" version="1" comment="pcp-selinux is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872937" version="1" comment="pcp-system-tools is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872938" version="1" comment="pcp-zeroconf is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872939" version="1" comment="perl-PCP-LogImport is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872940" version="1" comment="perl-PCP-LogSummary is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872941" version="1" comment="perl-PCP-MMV is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872942" version="1" comment="perl-PCP-PMDA is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872943" version="1" comment="python3-pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866767" version="1" comment="grafana is &lt;9.2.10-16.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866768" version="1" comment="grafana-selinux is &lt;9.2.10-16.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866769" version="1" comment="grafana-pcp is &lt;5.1.1-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868787" version="1" comment="gnutls is &lt;3.8.3-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868788" version="1" comment="gnutls-c++ is &lt;3.8.3-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868789" version="1" comment="gnutls-dane is &lt;3.8.3-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868790" version="1" comment="gnutls-devel is &lt;3.8.3-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868791" version="1" comment="gnutls-utils is &lt;3.8.3-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868954" version="1" comment="libipa_hbac is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868955" version="1" comment="libsss_autofs is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868956" version="1" comment="libsss_certmap is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868957" version="1" comment="libsss_idmap is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868958" version="1" comment="libsss_nss_idmap is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868959" version="1" comment="libsss_nss_idmap-devel is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868960" version="1" comment="libsss_simpleifp is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868961" version="1" comment="libsss_sudo is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868962" version="1" comment="python3-libipa_hbac is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868963" version="1" comment="python3-libsss_nss_idmap is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868964" version="1" comment="python3-sss is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868965" version="1" comment="python3-sss-murmur is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868966" version="1" comment="python3-sssdconfig is &lt;2.9.4-6.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868967" version="1" comment="sssd is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868968" version="1" comment="sssd-ad is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868969" version="1" comment="sssd-client is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868970" version="1" comment="sssd-common is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868971" version="1" comment="sssd-common-pac is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868972" version="1" comment="sssd-dbus is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868973" version="1" comment="sssd-idp is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868974" version="1" comment="sssd-ipa is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868975" version="1" comment="sssd-kcm is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868976" version="1" comment="sssd-krb5 is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868977" version="1" comment="sssd-krb5-common is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868978" version="1" comment="sssd-ldap is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868979" version="1" comment="sssd-nfs-idmap is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868980" version="1" comment="sssd-passkey is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868981" version="1" comment="sssd-polkit-rules is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868982" version="1" comment="sssd-proxy is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868983" version="1" comment="sssd-tools is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868984" version="1" comment="sssd-winbind-idmap is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866770" version="1" comment="tigervnc is &lt;1.13.1-8.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866771" version="1" comment="tigervnc-icons is &lt;1.13.1-8.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866772" version="1" comment="tigervnc-license is &lt;1.13.1-8.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866773" version="1" comment="tigervnc-selinux is &lt;1.13.1-8.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866774" version="1" comment="tigervnc-server is &lt;1.13.1-8.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866775" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-8.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866776" version="1" comment="tigervnc-server-module is &lt;1.13.1-8.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866777" version="1" comment="libxml2 is &lt;2.9.13-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866778" version="1" comment="libxml2-devel is &lt;2.9.13-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866779" version="1" comment="python3-libxml2 is &lt;2.9.13-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866780" version="1" comment="git-lfs is &lt;3.4.1-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870083" version="1" comment="bpftool is &lt;7.3.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870084" version="1" comment="kernel is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870085" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.16.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870086" version="1" comment="kernel-core is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870087" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870088" version="1" comment="kernel-debug is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870089" version="1" comment="kernel-debug-core is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870092" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870093" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870094" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870095" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870098" version="1" comment="kernel-doc is &lt;5.14.0-427.16.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870099" version="1" comment="kernel-headers is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870100" version="1" comment="kernel-modules is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870101" version="1" comment="kernel-modules-core is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870102" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870103" version="1" comment="kernel-tools is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870104" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870106" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870107" version="1" comment="libperf is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870108" version="1" comment="perf is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870109" version="1" comment="python3-perf is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870110" version="1" comment="rtla is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870111" version="1" comment="rv is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868792" version="1" comment="nodejs is &lt;18.20.2-2.module+el9.4.0+21742+692df1ea for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868793" version="1" comment="nodejs-devel is &lt;18.20.2-2.module+el9.4.0+21742+692df1ea for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868794" version="1" comment="nodejs-docs is &lt;18.20.2-2.module+el9.4.0+21742+692df1ea for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868795" version="1" comment="nodejs-full-i18n is &lt;18.20.2-2.module+el9.4.0+21742+692df1ea for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868796" version="1" comment="npm is &lt;10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872304" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872305" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872306" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872307" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872308" version="1" comment="dotnet-host is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872309" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872310" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872311" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872312" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.105-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872313" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.105-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872314" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.105-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872315" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872316" version="1" comment="dotnet-templates-8.0 is &lt;8.0.105-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872317" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.105-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053980" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.19-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053981" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.19-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053982" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.19-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053983" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.19-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053984" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.19-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053985" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.119-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872318" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.119-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053986" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.19-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053987" version="1" comment="dotnet-templates-7.0 is &lt;7.0.119-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868797" version="1" comment="nodejs is &lt;20.12.2-2.module+el9.4.0+21731+46b5b8a7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868798" version="1" comment="nodejs-devel is &lt;20.12.2-2.module+el9.4.0+21731+46b5b8a7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868799" version="1" comment="nodejs-docs is &lt;20.12.2-2.module+el9.4.0+21731+46b5b8a7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868800" version="1" comment="nodejs-full-i18n is &lt;20.12.2-2.module+el9.4.0+21731+46b5b8a7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868801" version="1" comment="npm is &lt;10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875027" version="1" comment="firefox is &lt;115.11.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875028" version="1" comment="firefox-x11 is &lt;115.11.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875029" version="1" comment="thunderbird is &lt;115.11.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866781" version="1" comment="nodejs is &lt;16.20.2-8.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866782" version="1" comment="nodejs-docs is &lt;16.20.2-8.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866783" version="1" comment="nodejs-full-i18n is &lt;16.20.2-8.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866784" version="1" comment="nodejs-libs is &lt;16.20.2-8.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866785" version="1" comment="npm is &lt;8.19.4-1.16.20.2.8.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870112" version="1" comment="bpftool is &lt;7.3.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870113" version="1" comment="kernel is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870114" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.18.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870115" version="1" comment="kernel-core is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870116" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870117" version="1" comment="kernel-debug is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870118" version="1" comment="kernel-debug-core is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870121" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870122" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870123" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870124" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870127" version="1" comment="kernel-doc is &lt;5.14.0-427.18.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870128" version="1" comment="kernel-headers is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870129" version="1" comment="kernel-modules is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870130" version="1" comment="kernel-modules-core is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870131" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870132" version="1" comment="kernel-tools is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870133" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870135" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870136" version="1" comment="libperf is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870137" version="1" comment="perf is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870138" version="1" comment="python3-perf is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870139" version="1" comment="rtla is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870140" version="1" comment="rv is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866786" version="1" comment="tomcat is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866787" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866788" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866789" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866790" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866791" version="1" comment="tomcat-lib is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866792" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866793" version="1" comment="tomcat-webapps is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866794" version="1" comment="glibc is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866795" version="1" comment="glibc-all-langpacks is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866796" version="1" comment="glibc-benchtests is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866797" version="1" comment="glibc-common is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866798" version="1" comment="glibc-devel is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866799" version="1" comment="glibc-doc is &lt;2.34-100.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866800" version="1" comment="glibc-gconv-extra is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866801" version="1" comment="glibc-headers is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866802" version="1" comment="glibc-langpack-aa is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866803" version="1" comment="glibc-langpack-af is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866804" version="1" comment="glibc-langpack-agr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866805" version="1" comment="glibc-langpack-ak is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866806" version="1" comment="glibc-langpack-am is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866807" version="1" comment="glibc-langpack-an is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866808" version="1" comment="glibc-langpack-anp is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866809" version="1" comment="glibc-langpack-ar is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866810" version="1" comment="glibc-langpack-as is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866811" version="1" comment="glibc-langpack-ast is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866812" version="1" comment="glibc-langpack-ayc is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866813" version="1" comment="glibc-langpack-az is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866814" version="1" comment="glibc-langpack-be is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866815" version="1" comment="glibc-langpack-bem is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866816" version="1" comment="glibc-langpack-ber is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866817" version="1" comment="glibc-langpack-bg is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866818" version="1" comment="glibc-langpack-bhb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866819" version="1" comment="glibc-langpack-bho is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866820" version="1" comment="glibc-langpack-bi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866821" version="1" comment="glibc-langpack-bn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866822" version="1" comment="glibc-langpack-bo is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866823" version="1" comment="glibc-langpack-br is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866824" version="1" comment="glibc-langpack-brx is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866825" version="1" comment="glibc-langpack-bs is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866826" version="1" comment="glibc-langpack-byn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866827" version="1" comment="glibc-langpack-ca is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866828" version="1" comment="glibc-langpack-ce is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866829" version="1" comment="glibc-langpack-chr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866830" version="1" comment="glibc-langpack-ckb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866831" version="1" comment="glibc-langpack-cmn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866832" version="1" comment="glibc-langpack-crh is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866833" version="1" comment="glibc-langpack-cs is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866834" version="1" comment="glibc-langpack-csb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866835" version="1" comment="glibc-langpack-cv is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866836" version="1" comment="glibc-langpack-cy is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866837" version="1" comment="glibc-langpack-da is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866838" version="1" comment="glibc-langpack-de is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866839" version="1" comment="glibc-langpack-doi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866840" version="1" comment="glibc-langpack-dsb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866841" version="1" comment="glibc-langpack-dv is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866842" version="1" comment="glibc-langpack-dz is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866843" version="1" comment="glibc-langpack-el is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866844" version="1" comment="glibc-langpack-en is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866845" version="1" comment="glibc-langpack-eo is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866846" version="1" comment="glibc-langpack-es is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866847" version="1" comment="glibc-langpack-et is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866848" version="1" comment="glibc-langpack-eu is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866849" version="1" comment="glibc-langpack-fa is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866850" version="1" comment="glibc-langpack-ff is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866851" version="1" comment="glibc-langpack-fi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866852" version="1" comment="glibc-langpack-fil is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866853" version="1" comment="glibc-langpack-fo is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866854" version="1" comment="glibc-langpack-fr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866855" version="1" comment="glibc-langpack-fur is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866856" version="1" comment="glibc-langpack-fy is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866857" version="1" comment="glibc-langpack-ga is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866858" version="1" comment="glibc-langpack-gd is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866859" version="1" comment="glibc-langpack-gez is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866860" version="1" comment="glibc-langpack-gl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866861" version="1" comment="glibc-langpack-gu is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866862" version="1" comment="glibc-langpack-gv is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866863" version="1" comment="glibc-langpack-ha is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866864" version="1" comment="glibc-langpack-hak is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866865" version="1" comment="glibc-langpack-he is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866866" version="1" comment="glibc-langpack-hi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866867" version="1" comment="glibc-langpack-hif is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866868" version="1" comment="glibc-langpack-hne is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866869" version="1" comment="glibc-langpack-hr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866870" version="1" comment="glibc-langpack-hsb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866871" version="1" comment="glibc-langpack-ht is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866872" version="1" comment="glibc-langpack-hu is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866873" version="1" comment="glibc-langpack-hy is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866874" version="1" comment="glibc-langpack-ia is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866875" version="1" comment="glibc-langpack-id is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866876" version="1" comment="glibc-langpack-ig is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866877" version="1" comment="glibc-langpack-ik is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866878" version="1" comment="glibc-langpack-is is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866879" version="1" comment="glibc-langpack-it is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866880" version="1" comment="glibc-langpack-iu is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866881" version="1" comment="glibc-langpack-ja is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866882" version="1" comment="glibc-langpack-ka is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866883" version="1" comment="glibc-langpack-kab is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866884" version="1" comment="glibc-langpack-kk is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866885" version="1" comment="glibc-langpack-kl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866886" version="1" comment="glibc-langpack-km is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866887" version="1" comment="glibc-langpack-kn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866888" version="1" comment="glibc-langpack-ko is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866889" version="1" comment="glibc-langpack-kok is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866890" version="1" comment="glibc-langpack-ks is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866891" version="1" comment="glibc-langpack-ku is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866892" version="1" comment="glibc-langpack-kw is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866893" version="1" comment="glibc-langpack-ky is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866894" version="1" comment="glibc-langpack-lb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866895" version="1" comment="glibc-langpack-lg is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866896" version="1" comment="glibc-langpack-li is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866897" version="1" comment="glibc-langpack-lij is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866898" version="1" comment="glibc-langpack-ln is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866899" version="1" comment="glibc-langpack-lo is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866900" version="1" comment="glibc-langpack-lt is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866901" version="1" comment="glibc-langpack-lv is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866902" version="1" comment="glibc-langpack-lzh is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866903" version="1" comment="glibc-langpack-mag is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866904" version="1" comment="glibc-langpack-mai is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866905" version="1" comment="glibc-langpack-mfe is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866906" version="1" comment="glibc-langpack-mg is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866907" version="1" comment="glibc-langpack-mhr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866908" version="1" comment="glibc-langpack-mi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866909" version="1" comment="glibc-langpack-miq is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866910" version="1" comment="glibc-langpack-mjw is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866911" version="1" comment="glibc-langpack-mk is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866912" version="1" comment="glibc-langpack-ml is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866913" version="1" comment="glibc-langpack-mn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866914" version="1" comment="glibc-langpack-mni is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866915" version="1" comment="glibc-langpack-mnw is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866916" version="1" comment="glibc-langpack-mr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866917" version="1" comment="glibc-langpack-ms is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866918" version="1" comment="glibc-langpack-mt is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866919" version="1" comment="glibc-langpack-my is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866920" version="1" comment="glibc-langpack-nan is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866921" version="1" comment="glibc-langpack-nb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866922" version="1" comment="glibc-langpack-nds is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866923" version="1" comment="glibc-langpack-ne is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866924" version="1" comment="glibc-langpack-nhn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866925" version="1" comment="glibc-langpack-niu is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866926" version="1" comment="glibc-langpack-nl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866927" version="1" comment="glibc-langpack-nn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866928" version="1" comment="glibc-langpack-nr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866929" version="1" comment="glibc-langpack-nso is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866930" version="1" comment="glibc-langpack-oc is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866931" version="1" comment="glibc-langpack-om is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866932" version="1" comment="glibc-langpack-or is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866933" version="1" comment="glibc-langpack-os is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866934" version="1" comment="glibc-langpack-pa is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866935" version="1" comment="glibc-langpack-pap is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866936" version="1" comment="glibc-langpack-pl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866937" version="1" comment="glibc-langpack-ps is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866938" version="1" comment="glibc-langpack-pt is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866939" version="1" comment="glibc-langpack-quz is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866940" version="1" comment="glibc-langpack-raj is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866941" version="1" comment="glibc-langpack-ro is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866942" version="1" comment="glibc-langpack-ru is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866943" version="1" comment="glibc-langpack-rw is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866944" version="1" comment="glibc-langpack-sa is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866945" version="1" comment="glibc-langpack-sah is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866946" version="1" comment="glibc-langpack-sat is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866947" version="1" comment="glibc-langpack-sc is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866948" version="1" comment="glibc-langpack-sd is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866949" version="1" comment="glibc-langpack-se is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866950" version="1" comment="glibc-langpack-sgs is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866951" version="1" comment="glibc-langpack-shn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866952" version="1" comment="glibc-langpack-shs is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866953" version="1" comment="glibc-langpack-si is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866954" version="1" comment="glibc-langpack-sid is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866955" version="1" comment="glibc-langpack-sk is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866956" version="1" comment="glibc-langpack-sl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866957" version="1" comment="glibc-langpack-sm is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866958" version="1" comment="glibc-langpack-so is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866959" version="1" comment="glibc-langpack-sq is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866960" version="1" comment="glibc-langpack-sr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866961" version="1" comment="glibc-langpack-ss is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866962" version="1" comment="glibc-langpack-st is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866963" version="1" comment="glibc-langpack-sv is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866964" version="1" comment="glibc-langpack-sw is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866965" version="1" comment="glibc-langpack-szl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866966" version="1" comment="glibc-langpack-ta is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866967" version="1" comment="glibc-langpack-tcy is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866968" version="1" comment="glibc-langpack-te is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866969" version="1" comment="glibc-langpack-tg is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866970" version="1" comment="glibc-langpack-th is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866971" version="1" comment="glibc-langpack-the is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866972" version="1" comment="glibc-langpack-ti is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866973" version="1" comment="glibc-langpack-tig is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866974" version="1" comment="glibc-langpack-tk is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866975" version="1" comment="glibc-langpack-tl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866976" version="1" comment="glibc-langpack-tn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866977" version="1" comment="glibc-langpack-to is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866978" version="1" comment="glibc-langpack-tpi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866979" version="1" comment="glibc-langpack-tr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866980" version="1" comment="glibc-langpack-ts is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866981" version="1" comment="glibc-langpack-tt is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866982" version="1" comment="glibc-langpack-ug is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866983" version="1" comment="glibc-langpack-uk is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866984" version="1" comment="glibc-langpack-unm is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866985" version="1" comment="glibc-langpack-ur is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866986" version="1" comment="glibc-langpack-uz is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866987" version="1" comment="glibc-langpack-ve is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866988" version="1" comment="glibc-langpack-vi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866989" version="1" comment="glibc-langpack-wa is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866990" version="1" comment="glibc-langpack-wae is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866991" version="1" comment="glibc-langpack-wal is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866992" version="1" comment="glibc-langpack-wo is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866993" version="1" comment="glibc-langpack-xh is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866994" version="1" comment="glibc-langpack-yi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866995" version="1" comment="glibc-langpack-yo is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866996" version="1" comment="glibc-langpack-yue is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866997" version="1" comment="glibc-langpack-yuw is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866998" version="1" comment="glibc-langpack-zh is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866999" version="1" comment="glibc-langpack-zu is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867000" version="1" comment="glibc-locale-source is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867001" version="1" comment="glibc-minimal-langpack is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867002" version="1" comment="glibc-nss-devel is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867003" version="1" comment="glibc-static is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867004" version="1" comment="glibc-utils is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867005" version="1" comment="libnsl is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867006" version="1" comment="nscd is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867007" version="1" comment="nss_db is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867008" version="1" comment="nss_hesiod is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872319" version="1" comment="libnghttp2 is &lt;1.43.0-5.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872320" version="1" comment="libnghttp2-devel is &lt;1.43.0-5.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872321" version="1" comment="nghttp2 is &lt;1.43.0-5.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867009" version="1" comment="less is &lt;590-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870141" version="1" comment="bpftool is &lt;7.3.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870142" version="1" comment="kernel is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870143" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.20.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870144" version="1" comment="kernel-core is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870145" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870146" version="1" comment="kernel-debug is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870147" version="1" comment="kernel-debug-core is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870150" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870151" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870152" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870153" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870156" version="1" comment="kernel-doc is &lt;5.14.0-427.20.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870157" version="1" comment="kernel-headers is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870158" version="1" comment="kernel-modules is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870159" version="1" comment="kernel-modules-core is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870160" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870161" version="1" comment="kernel-tools is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870162" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870164" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870165" version="1" comment="libperf is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870166" version="1" comment="perf is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870167" version="1" comment="python3-perf is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870168" version="1" comment="rtla is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870169" version="1" comment="rv is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872322" version="1" comment="ruby is &lt;3.1.5-144.module+el9.4.0+21780+79b7bdb5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872323" version="1" comment="ruby-bundled-gems is &lt;3.1.5-144.module+el9.4.0+21780+79b7bdb5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872324" version="1" comment="ruby-default-gems is &lt;3.1.5-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872325" version="1" comment="ruby-devel is &lt;3.1.5-144.module+el9.4.0+21780+79b7bdb5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872326" version="1" comment="ruby-doc is &lt;3.1.5-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872327" version="1" comment="ruby-libs is &lt;3.1.5-144.module+el9.4.0+21780+79b7bdb5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872328" version="1" comment="rubygem-bigdecimal is &lt;3.1.1-144.module+el9.4.0+21780+79b7bdb5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872329" version="1" comment="rubygem-bundler is &lt;2.3.27-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872330" version="1" comment="rubygem-io-console is &lt;0.5.11-144.module+el9.4.0+21780+79b7bdb5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872331" version="1" comment="rubygem-irb is &lt;1.4.1-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872332" version="1" comment="rubygem-json is &lt;2.6.1-144.module+el9.4.0+21780+79b7bdb5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872333" version="1" comment="rubygem-minitest is &lt;5.15.0-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872334" version="1" comment="rubygem-power_assert is &lt;2.0.1-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872335" version="1" comment="rubygem-psych is &lt;4.0.4-144.module+el9.4.0+21780+79b7bdb5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872336" version="1" comment="rubygem-rake is &lt;13.0.6-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872337" version="1" comment="rubygem-rbs is &lt;2.7.0-144.module+el9.4.0+21780+79b7bdb5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872338" version="1" comment="rubygem-rdoc is &lt;6.4.1.1-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872339" version="1" comment="rubygem-rexml is &lt;3.2.5-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872340" version="1" comment="rubygem-rss is &lt;0.2.9-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872341" version="1" comment="rubygem-test-unit is &lt;3.5.3-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872342" version="1" comment="rubygem-typeprof is &lt;0.21.3-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872343" version="1" comment="rubygems is &lt;3.3.27-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872344" version="1" comment="rubygems-devel is &lt;3.3.27-144.module+el9.4.0+21780+79b7bdb5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874712" version="1" comment="ruby is &lt;3.3.1-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874713" version="1" comment="ruby-bundled-gems is &lt;3.3.1-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874714" version="1" comment="ruby-default-gems is &lt;3.3.1-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874715" version="1" comment="ruby-devel is &lt;3.3.1-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874716" version="1" comment="ruby-doc is &lt;3.3.1-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874717" version="1" comment="ruby-libs is &lt;3.3.1-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874718" version="1" comment="rubygem-bigdecimal is &lt;3.1.5-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874719" version="1" comment="rubygem-bundler is &lt;2.5.9-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874720" version="1" comment="rubygem-io-console is &lt;0.7.1-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874721" version="1" comment="rubygem-irb is &lt;1.11.0-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874722" version="1" comment="rubygem-json is &lt;2.7.1-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874723" version="1" comment="rubygem-minitest is &lt;5.20.0-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874724" version="1" comment="rubygem-mysql2 is &lt;0.5.5-1.module+el9.4.0+21222+faeeed2f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874725" version="1" comment="rubygem-mysql2-doc is &lt;0.5.5-1.module+el9.4.0+21222+faeeed2f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874726" version="1" comment="rubygem-pg is &lt;1.5.4-1.module+el9.4.0+21222+faeeed2f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874727" version="1" comment="rubygem-pg-doc is &lt;1.5.4-1.module+el9.4.0+21222+faeeed2f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874728" version="1" comment="rubygem-power_assert is &lt;2.0.3-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874729" version="1" comment="rubygem-psych is &lt;5.1.2-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874730" version="1" comment="rubygem-racc is &lt;1.7.3-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874731" version="1" comment="rubygem-rake is &lt;13.1.0-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874732" version="1" comment="rubygem-rbs is &lt;3.4.0-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874733" version="1" comment="rubygem-rdoc is &lt;6.6.3.1-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874734" version="1" comment="rubygem-rexml is &lt;3.2.6-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874735" version="1" comment="rubygem-rss is &lt;0.3.0-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874736" version="1" comment="rubygem-test-unit is &lt;3.6.1-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874737" version="1" comment="rubygem-typeprof is &lt;0.21.9-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874738" version="1" comment="rubygems is &lt;3.5.9-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874739" version="1" comment="rubygems-devel is &lt;3.5.9-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871308" version="1" comment="ipa-client is &lt;4.11.0-15.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871309" version="1" comment="ipa-client-common is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871310" version="1" comment="ipa-client-epn is &lt;4.11.0-15.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871311" version="1" comment="ipa-client-samba is &lt;4.11.0-15.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871312" version="1" comment="ipa-common is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871313" version="1" comment="ipa-selinux is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871314" version="1" comment="ipa-server is &lt;4.11.0-15.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871315" version="1" comment="ipa-server-common is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871316" version="1" comment="ipa-server-dns is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871317" version="1" comment="ipa-server-trust-ad is &lt;4.11.0-15.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871318" version="1" comment="python3-ipaclient is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871319" version="1" comment="python3-ipalib is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871320" version="1" comment="python3-ipaserver is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871321" version="1" comment="python3-ipatests is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867010" version="1" comment="fence-agents-aliyun is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867011" version="1" comment="fence-agents-all is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867012" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867013" version="1" comment="fence-agents-apc is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867014" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867015" version="1" comment="fence-agents-aws is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867016" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867017" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867018" version="1" comment="fence-agents-brocade is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867019" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867020" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867021" version="1" comment="fence-agents-common is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867022" version="1" comment="fence-agents-compute is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867023" version="1" comment="fence-agents-drac5 is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867024" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867025" version="1" comment="fence-agents-emerson is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867026" version="1" comment="fence-agents-eps is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867027" version="1" comment="fence-agents-gce is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867028" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867029" version="1" comment="fence-agents-hpblade is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867030" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867031" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867032" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867033" version="1" comment="fence-agents-ifmib is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867034" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867035" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867036" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867037" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867038" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867039" version="1" comment="fence-agents-ipdu is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867040" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867041" version="1" comment="fence-agents-kdump is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867042" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867043" version="1" comment="fence-agents-mpath is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867044" version="1" comment="fence-agents-openstack is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867045" version="1" comment="fence-agents-redfish is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867046" version="1" comment="fence-agents-rhevm is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867047" version="1" comment="fence-agents-rsa is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867048" version="1" comment="fence-agents-rsb is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867049" version="1" comment="fence-agents-sbd is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867050" version="1" comment="fence-agents-scsi is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867051" version="1" comment="fence-agents-virsh is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867052" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867053" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867054" version="1" comment="fence-agents-wti is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867055" version="1" comment="fence-virt is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867056" version="1" comment="fence-virtd is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867057" version="1" comment="fence-virtd-cpg is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867058" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867059" version="1" comment="fence-virtd-multicast is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867060" version="1" comment="fence-virtd-serial is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867061" version="1" comment="fence-virtd-tcp is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867062" version="1" comment="ha-cloud-support is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867234" version="1" comment="podman is &lt;4.9.4-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867235" version="1" comment="podman-docker is &lt;4.9.4-4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867236" version="1" comment="podman-plugins is &lt;4.9.4-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867237" version="1" comment="podman-remote is &lt;4.9.4-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867238" version="1" comment="podman-tests is &lt;4.9.4-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867063" version="1" comment="buildah is &lt;1.33.7-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867064" version="1" comment="buildah-tests is &lt;1.33.7-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869921" version="1" comment="gvisor-tap-vsock is &lt;0.7.3-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872568" version="1" comment="containernetworking-plugins is &lt;1.4.0-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871322" version="1" comment="gdk-pixbuf2 is &lt;2.42.6-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871323" version="1" comment="gdk-pixbuf2-devel is &lt;2.42.6-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871324" version="1" comment="gdk-pixbuf2-modules is &lt;2.42.6-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867065" version="1" comment="389-ds-base is &lt;2.4.5-8.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867066" version="1" comment="389-ds-base-libs is &lt;2.4.5-8.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867067" version="1" comment="python3-lib389 is &lt;2.4.5-8.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872569" version="1" comment="ruby is &lt;3.0.7-162.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872570" version="1" comment="ruby-default-gems is &lt;3.0.7-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872571" version="1" comment="ruby-devel is &lt;3.0.7-162.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872572" version="1" comment="ruby-doc is &lt;3.0.7-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872573" version="1" comment="ruby-libs is &lt;3.0.7-162.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872574" version="1" comment="rubygem-bigdecimal is &lt;3.0.0-162.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872575" version="1" comment="rubygem-bundler is &lt;2.2.33-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872576" version="1" comment="rubygem-io-console is &lt;0.5.7-162.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872577" version="1" comment="rubygem-irb is &lt;1.3.5-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872578" version="1" comment="rubygem-json is &lt;2.5.1-162.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872579" version="1" comment="rubygem-minitest is &lt;5.14.2-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872580" version="1" comment="rubygem-power_assert is &lt;1.2.1-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872581" version="1" comment="rubygem-psych is &lt;3.3.2-162.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872582" version="1" comment="rubygem-rake is &lt;13.0.3-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872583" version="1" comment="rubygem-rbs is &lt;1.4.0-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872584" version="1" comment="rubygem-rdoc is &lt;6.3.4.1-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872585" version="1" comment="rubygem-rexml is &lt;3.2.5-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872586" version="1" comment="rubygem-rss is &lt;0.2.9-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872587" version="1" comment="rubygem-test-unit is &lt;3.3.7-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872588" version="1" comment="rubygem-typeprof is &lt;0.15.2-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872589" version="1" comment="rubygems is &lt;3.2.33-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872590" version="1" comment="rubygems-devel is &lt;3.2.33-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870286" version="1" comment="c-ares is &lt;1.19.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870287" version="1" comment="c-ares-devel is &lt;1.19.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871325" version="1" comment="cockpit is &lt;311.2-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871326" version="1" comment="cockpit-bridge is &lt;311.2-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871327" version="1" comment="cockpit-doc is &lt;311.2-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871328" version="1" comment="cockpit-packagekit is &lt;311.2-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871329" version="1" comment="cockpit-pcp is &lt;311.2-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871330" version="1" comment="cockpit-storaged is &lt;311.2-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871331" version="1" comment="cockpit-system is &lt;311.2-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871332" version="1" comment="cockpit-ws is &lt;311.2-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867068" version="1" comment="python3-idna is &lt;2.10-7.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869922" version="1" comment="firefox is &lt;115.12.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869923" version="1" comment="firefox-x11 is &lt;115.12.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869924" version="1" comment="flatpak is &lt;1.12.9-1.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869925" version="1" comment="flatpak-devel is &lt;1.12.9-1.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869926" version="1" comment="flatpak-libs is &lt;1.12.9-1.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869927" version="1" comment="flatpak-selinux is &lt;1.12.9-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869928" version="1" comment="flatpak-session-helper is &lt;1.12.9-1.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869929" version="1" comment="ghostscript is &lt;9.54.0-16.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869930" version="1" comment="ghostscript-doc is &lt;9.54.0-16.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869931" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-16.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869932" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-16.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869933" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-16.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869934" version="1" comment="ghostscript-x11 is &lt;9.54.0-16.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869935" version="1" comment="libgs is &lt;9.54.0-16.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869936" version="1" comment="libgs-devel is &lt;9.54.0-16.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869937" version="1" comment="thunderbird is &lt;115.12.1-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869938" version="1" comment="libreswan is &lt;4.12-2.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869939" version="1" comment="python3.11 is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869940" version="1" comment="python3.11-debug is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869941" version="1" comment="python3.11-devel is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869942" version="1" comment="python3.11-idle is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869943" version="1" comment="python3.11-libs is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869944" version="1" comment="python3.11-test is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869945" version="1" comment="python3.11-tkinter is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869946" version="1" comment="python-unversioned-command is &lt;3.9.18-3.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869947" version="1" comment="python3 is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869948" version="1" comment="python3-debug is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869949" version="1" comment="python3-devel is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869950" version="1" comment="python3-idle is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869951" version="1" comment="python3-libs is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869952" version="1" comment="python3-test is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869953" version="1" comment="python3-tkinter is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869954" version="1" comment="git is &lt;2.43.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869955" version="1" comment="git-all is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869956" version="1" comment="git-core is &lt;2.43.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869957" version="1" comment="git-core-doc is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869958" version="1" comment="git-credential-libsecret is &lt;2.43.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869959" version="1" comment="git-daemon is &lt;2.43.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869960" version="1" comment="git-email is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869961" version="1" comment="git-gui is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869962" version="1" comment="git-instaweb is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869963" version="1" comment="git-subtree is &lt;2.43.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869964" version="1" comment="git-svn is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869965" version="1" comment="gitk is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869966" version="1" comment="gitweb is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869967" version="1" comment="perl-Git is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869968" version="1" comment="perl-Git-SVN is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870170" version="1" comment="idm-pki-acme is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870171" version="1" comment="idm-pki-base is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870172" version="1" comment="idm-pki-ca is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870173" version="1" comment="idm-pki-est is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870174" version="1" comment="idm-pki-java is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870175" version="1" comment="idm-pki-kra is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870176" version="1" comment="idm-pki-server is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870177" version="1" comment="idm-pki-tools is &lt;11.5.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870178" version="1" comment="python3-idm-pki is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871865" version="1" comment="go-toolset is &lt;1.21.11-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871866" version="1" comment="golang is &lt;1.21.11-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871867" version="1" comment="golang-bin is &lt;1.21.11-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871868" version="1" comment="golang-docs is &lt;1.21.11-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871869" version="1" comment="golang-misc is &lt;1.21.11-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871870" version="1" comment="golang-src is &lt;1.21.11-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871871" version="1" comment="golang-tests is &lt;1.21.11-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874007" version="1" comment="qemu-guest-agent is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874008" version="1" comment="qemu-img is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874009" version="1" comment="qemu-kvm is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874010" version="1" comment="qemu-kvm-audio-pa is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874011" version="1" comment="qemu-kvm-block-blkio is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874012" version="1" comment="qemu-kvm-block-curl is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874013" version="1" comment="qemu-kvm-block-rbd is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874014" version="1" comment="qemu-kvm-common is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874015" version="1" comment="qemu-kvm-core is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874016" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874017" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874018" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874019" version="1" comment="qemu-kvm-device-usb-host is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874020" version="1" comment="qemu-kvm-device-usb-redirect is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874021" version="1" comment="qemu-kvm-docs is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874022" version="1" comment="qemu-kvm-tools is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874023" version="1" comment="qemu-kvm-ui-egl-headless is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874024" version="1" comment="qemu-kvm-ui-opengl is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874025" version="1" comment="qemu-pr-helper is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871872" version="1" comment="openssh is &lt;8.7p1-38.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871873" version="1" comment="openssh-askpass is &lt;8.7p1-38.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871874" version="1" comment="openssh-clients is &lt;8.7p1-38.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871875" version="1" comment="openssh-keycat is &lt;8.7p1-38.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871876" version="1" comment="openssh-server is &lt;8.7p1-38.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871877" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.38.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872944" version="1" comment="bpftool is &lt;7.3.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872945" version="1" comment="kernel is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872946" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.24.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872947" version="1" comment="kernel-core is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872948" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872949" version="1" comment="kernel-debug is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872950" version="1" comment="kernel-debug-core is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872953" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872954" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872955" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872956" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872959" version="1" comment="kernel-doc is &lt;5.14.0-427.24.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872960" version="1" comment="kernel-headers is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872961" version="1" comment="kernel-modules is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872962" version="1" comment="kernel-modules-core is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872963" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872964" version="1" comment="kernel-tools is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872965" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872967" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872968" version="1" comment="libperf is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872969" version="1" comment="perf is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872970" version="1" comment="python3-perf is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872971" version="1" comment="rtla is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872972" version="1" comment="rv is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874026" version="1" comment="buildah is &lt;1.33.7-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874027" version="1" comment="buildah-tests is &lt;1.33.7-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874028" version="1" comment="podman is &lt;4.9.4-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874029" version="1" comment="podman-docker is &lt;4.9.4-5.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874030" version="1" comment="podman-plugins is &lt;4.9.4-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874031" version="1" comment="podman-remote is &lt;4.9.4-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874032" version="1" comment="podman-tests is &lt;4.9.4-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874033" version="1" comment="gvisor-tap-vsock is &lt;0.7.3-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942600" version="1" comment="fence-agents-aliyun is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942601" version="1" comment="fence-agents-all is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942602" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942603" version="1" comment="fence-agents-apc is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942604" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942605" version="1" comment="fence-agents-aws is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942606" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942607" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942608" version="1" comment="fence-agents-brocade is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942609" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942610" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875438" version="1" comment="fence-agents-common is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875439" version="1" comment="fence-agents-compute is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942611" version="1" comment="fence-agents-drac5 is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942612" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942613" version="1" comment="fence-agents-emerson is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942614" version="1" comment="fence-agents-eps is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942615" version="1" comment="fence-agents-gce is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942616" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942617" version="1" comment="fence-agents-hpblade is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875440" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875441" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942618" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942619" version="1" comment="fence-agents-ifmib is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942620" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942621" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942622" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942623" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942624" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942625" version="1" comment="fence-agents-ipdu is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942626" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942627" version="1" comment="fence-agents-kdump is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875442" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942628" version="1" comment="fence-agents-mpath is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942629" version="1" comment="fence-agents-openstack is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942630" version="1" comment="fence-agents-redfish is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942631" version="1" comment="fence-agents-rhevm is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942632" version="1" comment="fence-agents-rsa is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942633" version="1" comment="fence-agents-rsb is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942634" version="1" comment="fence-agents-sbd is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942635" version="1" comment="fence-agents-scsi is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875443" version="1" comment="fence-agents-virsh is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942636" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942637" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942638" version="1" comment="fence-agents-wti is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875444" version="1" comment="fence-virt is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875445" version="1" comment="fence-virtd is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875446" version="1" comment="fence-virtd-cpg is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875447" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875448" version="1" comment="fence-virtd-multicast is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875449" version="1" comment="fence-virtd-serial is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875450" version="1" comment="fence-virtd-tcp is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942639" version="1" comment="ha-cloud-support is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875451" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.32-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875452" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.32-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875453" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.32-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875454" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.32-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875455" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.32-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875456" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.132-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875457" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.132-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875458" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.32-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875459" version="1" comment="dotnet-templates-6.0 is &lt;6.0.132-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872973" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872974" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872975" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872976" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872977" version="1" comment="dotnet-host is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872978" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872979" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872980" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872981" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.107-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872982" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.107-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872983" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.107-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872984" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872985" version="1" comment="dotnet-templates-8.0 is &lt;8.0.107-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872986" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.107-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872987" version="1" comment="openssh is &lt;8.7p1-38.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872988" version="1" comment="openssh-askpass is &lt;8.7p1-38.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872989" version="1" comment="openssh-clients is &lt;8.7p1-38.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872990" version="1" comment="openssh-keycat is &lt;8.7p1-38.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872991" version="1" comment="openssh-server is &lt;8.7p1-38.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872992" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.38.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875460" version="1" comment="firefox is &lt;115.13.0-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875461" version="1" comment="firefox-x11 is &lt;115.13.0-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872993" version="1" comment="skopeo is &lt;1.14.3-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872994" version="1" comment="skopeo-tests is &lt;1.14.3-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876076" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876077" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.422.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876078" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.422.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876079" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.422.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876080" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876081" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876082" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876083" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876084" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876085" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876086" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876087" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876088" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876089" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876090" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.422.b05-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876091" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.422.b05-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876092" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876093" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876094" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876095" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876330" version="1" comment="java-11-openjdk is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876331" version="1" comment="java-11-openjdk-demo is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876332" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876333" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876334" version="1" comment="java-11-openjdk-devel is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876335" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876336" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876337" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876338" version="1" comment="java-11-openjdk-headless is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876339" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876340" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876341" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876342" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876343" version="1" comment="java-11-openjdk-jmods is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876344" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876345" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876346" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876347" version="1" comment="java-11-openjdk-src is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876348" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876349" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876350" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876351" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876352" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876096" version="1" comment="java-17-openjdk is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876097" version="1" comment="java-17-openjdk-demo is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876098" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876099" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876100" version="1" comment="java-17-openjdk-devel is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876101" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876102" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876103" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876104" version="1" comment="java-17-openjdk-headless is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876105" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876106" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876107" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876108" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876109" version="1" comment="java-17-openjdk-jmods is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876110" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876111" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876112" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876113" version="1" comment="java-17-openjdk-src is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876114" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876115" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876116" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876117" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876118" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874669" version="1" comment="java-21-openjdk is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874670" version="1" comment="java-21-openjdk-demo is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874671" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874672" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874673" version="1" comment="java-21-openjdk-devel is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874674" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874675" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874676" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874677" version="1" comment="java-21-openjdk-headless is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874678" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874679" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874680" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874681" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874682" version="1" comment="java-21-openjdk-jmods is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874683" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874684" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874685" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874686" version="1" comment="java-21-openjdk-src is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874687" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874688" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874689" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874690" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874691" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876186" version="1" comment="bpftool is &lt;7.3.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876187" version="1" comment="kernel is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876188" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.26.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876189" version="1" comment="kernel-core is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876190" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876191" version="1" comment="kernel-debug is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876192" version="1" comment="kernel-debug-core is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876195" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876196" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876197" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876198" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876201" version="1" comment="kernel-doc is &lt;5.14.0-427.26.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876202" version="1" comment="kernel-headers is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876203" version="1" comment="kernel-modules is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876204" version="1" comment="kernel-modules-core is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876205" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876206" version="1" comment="kernel-tools is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876207" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876209" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876210" version="1" comment="libperf is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876211" version="1" comment="perf is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876212" version="1" comment="python3-perf is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876213" version="1" comment="rtla is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876214" version="1" comment="rv is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874740" version="1" comment="qt5-qtbase is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874741" version="1" comment="qt5-qtbase-common is &lt;5.15.9-10.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874742" version="1" comment="qt5-qtbase-devel is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874743" version="1" comment="qt5-qtbase-examples is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874744" version="1" comment="qt5-qtbase-gui is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874745" version="1" comment="qt5-qtbase-mysql is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874746" version="1" comment="qt5-qtbase-odbc is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874747" version="1" comment="qt5-qtbase-postgresql is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874748" version="1" comment="qt5-qtbase-private-devel is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874749" version="1" comment="qt5-qtbase-static is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877069" version="1" comment="thunderbird is &lt;115.13.0-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874750" version="1" comment="libndp is &lt;1.8-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876215" version="1" comment="httpd is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876216" version="1" comment="httpd-core is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876217" version="1" comment="httpd-devel is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876218" version="1" comment="httpd-filesystem is &lt;2.4.57-11.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876219" version="1" comment="httpd-manual is &lt;2.4.57-11.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876220" version="1" comment="httpd-tools is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876221" version="1" comment="mod_ldap is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876222" version="1" comment="mod_lua is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876223" version="1" comment="mod_proxy_html is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876224" version="1" comment="mod_session is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876225" version="1" comment="mod_ssl is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877070" version="1" comment="edk2-ovmf is &lt;20231122-6.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877071" version="1" comment="edk2-tools is &lt;20231122-6.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877072" version="1" comment="edk2-tools-doc is &lt;20231122-6.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877073" version="1" comment="libuv is &lt;1.42.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877074" version="1" comment="libuv-devel is &lt;1.42.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877075" version="1" comment="libvirt is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877076" version="1" comment="libvirt-client is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877077" version="1" comment="libvirt-client-qemu is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877078" version="1" comment="libvirt-daemon is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877079" version="1" comment="libvirt-daemon-common is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877080" version="1" comment="libvirt-daemon-config-network is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877081" version="1" comment="libvirt-daemon-config-nwfilter is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877082" version="1" comment="libvirt-daemon-driver-interface is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877083" version="1" comment="libvirt-daemon-driver-network is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877084" version="1" comment="libvirt-daemon-driver-nodedev is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877085" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877086" version="1" comment="libvirt-daemon-driver-qemu is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877087" version="1" comment="libvirt-daemon-driver-secret is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877088" version="1" comment="libvirt-daemon-driver-storage is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877089" version="1" comment="libvirt-daemon-driver-storage-core is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877090" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877091" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877092" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877093" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877094" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877095" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877096" version="1" comment="libvirt-daemon-kvm is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877097" version="1" comment="libvirt-daemon-lock is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877098" version="1" comment="libvirt-daemon-log is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877099" version="1" comment="libvirt-daemon-plugin-lockd is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877100" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877101" version="1" comment="libvirt-daemon-proxy is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877102" version="1" comment="libvirt-devel is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877103" version="1" comment="libvirt-docs is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877104" version="1" comment="libvirt-libs is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877105" version="1" comment="libvirt-nss is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877106" version="1" comment="containernetworking-plugins is &lt;1.4.0-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877107" version="1" comment="runc is &lt;1.1.12-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877108" version="1" comment="python3.11 is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877109" version="1" comment="python3.11-debug is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877110" version="1" comment="python3.11-devel is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877111" version="1" comment="python3.11-idle is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877112" version="1" comment="python3.11-libs is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877113" version="1" comment="python3.11-test is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877114" version="1" comment="python3.11-tkinter is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877115" version="1" comment="iwl100-firmware is &lt;39.31.5.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877116" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877117" version="1" comment="iwl105-firmware is &lt;18.168.6.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877118" version="1" comment="iwl135-firmware is &lt;18.168.6.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877119" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877120" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877121" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877122" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877123" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877124" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877125" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877126" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877127" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877128" version="1" comment="libertas-sd8787-firmware is &lt;20240603-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877129" version="1" comment="linux-firmware is &lt;20240603-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877130" version="1" comment="linux-firmware-whence is &lt;20240603-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877131" version="1" comment="netronome-firmware is &lt;20240603-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877132" version="1" comment="cups is &lt;2.3.3op2-27.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877133" version="1" comment="cups-client is &lt;2.3.3op2-27.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877134" version="1" comment="cups-devel is &lt;2.3.3op2-27.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877135" version="1" comment="cups-filesystem is &lt;2.3.3op2-27.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877136" version="1" comment="cups-ipptool is &lt;2.3.3op2-27.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877137" version="1" comment="cups-libs is &lt;2.3.3op2-27.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877138" version="1" comment="cups-lpd is &lt;2.3.3op2-27.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877139" version="1" comment="cups-printerapp is &lt;2.3.3op2-27.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877140" version="1" comment="python-unversioned-command is &lt;3.9.18-3.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877141" version="1" comment="python3 is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877142" version="1" comment="python3-debug is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877143" version="1" comment="python3-devel is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877144" version="1" comment="python3-idle is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877145" version="1" comment="python3-libs is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877146" version="1" comment="python3-test is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877147" version="1" comment="python3-tkinter is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876376" version="1" comment="squid is &lt;5.5-13.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877811" version="1" comment="bpftool is &lt;7.3.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877812" version="1" comment="kernel is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877813" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.28.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877814" version="1" comment="kernel-core is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877815" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877816" version="1" comment="kernel-debug is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877817" version="1" comment="kernel-debug-core is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877820" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877821" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877822" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877823" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877826" version="1" comment="kernel-doc is &lt;5.14.0-427.28.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877827" version="1" comment="kernel-headers is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877828" version="1" comment="kernel-modules is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877829" version="1" comment="kernel-modules-core is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877830" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877831" version="1" comment="kernel-tools is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877832" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877834" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877835" version="1" comment="libperf is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877836" version="1" comment="perf is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877837" version="1" comment="python3-perf is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877838" version="1" comment="rtla is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877839" version="1" comment="rv is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877798" version="1" comment="freeradius is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877799" version="1" comment="freeradius-devel is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877800" version="1" comment="freeradius-doc is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877801" version="1" comment="freeradius-krb5 is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877802" version="1" comment="freeradius-ldap is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877803" version="1" comment="freeradius-mysql is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877804" version="1" comment="freeradius-perl is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877805" version="1" comment="freeradius-postgresql is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877806" version="1" comment="freeradius-rest is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877807" version="1" comment="freeradius-sqlite is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877808" version="1" comment="freeradius-unixODBC is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877809" version="1" comment="freeradius-utils is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877810" version="1" comment="python3-freeradius is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879110" version="1" comment="httpd is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879111" version="1" comment="httpd-core is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879112" version="1" comment="httpd-devel is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879113" version="1" comment="httpd-filesystem is &lt;2.4.57-11.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879114" version="1" comment="httpd-manual is &lt;2.4.57-11.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879115" version="1" comment="httpd-tools is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879116" version="1" comment="mod_ldap is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879117" version="1" comment="mod_lua is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879118" version="1" comment="mod_proxy_html is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879119" version="1" comment="mod_session is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879120" version="1" comment="mod_ssl is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879623" version="1" comment="389-ds-base is &lt;2.4.5-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879624" version="1" comment="389-ds-base-devel is &lt;2.4.5-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879625" version="1" comment="389-ds-base-libs is &lt;2.4.5-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879626" version="1" comment="python3-lib389 is &lt;2.4.5-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879121" version="1" comment="bind is &lt;9.16.23-18.el9_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879122" version="1" comment="bind-chroot is &lt;9.16.23-18.el9_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879123" version="1" comment="bind-devel is &lt;9.16.23-18.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879124" version="1" comment="bind-dnssec-doc is &lt;9.16.23-18.el9_4.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879125" version="1" comment="bind-dnssec-utils is &lt;9.16.23-18.el9_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879126" version="1" comment="bind-doc is &lt;9.16.23-18.el9_4.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879127" version="1" comment="bind-dyndb-ldap is &lt;11.9-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879128" version="1" comment="bind-libs is &lt;9.16.23-18.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879129" version="1" comment="bind-license is &lt;9.16.23-18.el9_4.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879130" version="1" comment="bind-utils is &lt;9.16.23-18.el9_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879131" version="1" comment="python3-bind is &lt;9.16.23-18.el9_4.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879627" version="1" comment="python3.11-setuptools is &lt;65.5.1-2.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879628" version="1" comment="python3.11-setuptools-wheel is &lt;65.5.1-2.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941420" version="1" comment="firefox is &lt;115.14.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941421" version="1" comment="firefox-x11 is &lt;115.14.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881370" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881371" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881372" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881373" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881374" version="1" comment="dotnet-host is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881375" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881376" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881377" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881378" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.108-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881379" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.108-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881380" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.108-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881381" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881382" version="1" comment="dotnet-templates-8.0 is &lt;8.0.108-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881383" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.108-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879629" version="1" comment="bpftool is &lt;7.3.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879630" version="1" comment="kernel is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879631" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.31.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879632" version="1" comment="kernel-core is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879633" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879634" version="1" comment="kernel-debug is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879635" version="1" comment="kernel-debug-core is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879638" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879639" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879640" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879641" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879644" version="1" comment="kernel-doc is &lt;5.14.0-427.31.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879645" version="1" comment="kernel-headers is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879646" version="1" comment="kernel-modules is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879647" version="1" comment="kernel-modules-core is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879648" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879649" version="1" comment="kernel-tools is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879650" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879652" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879653" version="1" comment="libperf is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879654" version="1" comment="perf is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879655" version="1" comment="python3-perf is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879656" version="1" comment="rtla is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879657" version="1" comment="rv is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881384" version="1" comment="thunderbird is &lt;115.14.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880234" version="1" comment="curl is &lt;7.76.1-29.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880235" version="1" comment="curl-minimal is &lt;7.76.1-29.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880236" version="1" comment="libcurl is &lt;7.76.1-29.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880237" version="1" comment="libcurl-devel is &lt;7.76.1-29.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880238" version="1" comment="libcurl-minimal is &lt;7.76.1-29.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880239" version="1" comment="python3.12-setuptools is &lt;68.2.2-3.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880240" version="1" comment="python3.12-setuptools-wheel is &lt;68.2.2-3.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880241" version="1" comment="python3-setuptools is &lt;53.0.0-12.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880242" version="1" comment="python3-setuptools-wheel is &lt;53.0.0-12.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880871" version="1" comment="tomcat is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880872" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880873" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880874" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880875" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880876" version="1" comment="tomcat-lib is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880877" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880878" version="1" comment="tomcat-webapps is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881076" version="1" comment="nodejs is &lt;20.16.0-1.module+el9.4.0+22197+9e60f127 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881077" version="1" comment="nodejs-devel is &lt;20.16.0-1.module+el9.4.0+22197+9e60f127 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881078" version="1" comment="nodejs-docs is &lt;20.16.0-1.module+el9.4.0+22197+9e60f127 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881079" version="1" comment="nodejs-full-i18n is &lt;20.16.0-1.module+el9.4.0+22197+9e60f127 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881080" version="1" comment="npm is &lt;10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881443" version="1" comment="bpftool is &lt;7.3.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881444" version="1" comment="kernel is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881445" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.33.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881446" version="1" comment="kernel-core is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881447" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881448" version="1" comment="kernel-debug is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881449" version="1" comment="kernel-debug-core is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881452" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881453" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881454" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881455" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881458" version="1" comment="kernel-doc is &lt;5.14.0-427.33.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881459" version="1" comment="kernel-headers is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881460" version="1" comment="kernel-modules is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881461" version="1" comment="kernel-modules-core is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881462" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881463" version="1" comment="kernel-tools is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881464" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881466" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881467" version="1" comment="libperf is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881468" version="1" comment="perf is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881469" version="1" comment="python3-perf is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881470" version="1" comment="rtla is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881471" version="1" comment="rv is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881472" version="1" comment="pg_repack is &lt;1.4.8-1.module+el9.4.0+20427+07482b8c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881473" version="1" comment="pgaudit is &lt;16.0-1.module+el9.4.0+20427+07482b8c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881474" version="1" comment="postgres-decoderbufs is &lt;2.4.0-1.Final.module+el9.4.0+20427+07482b8c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881475" version="1" comment="postgresql is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881476" version="1" comment="postgresql-contrib is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881477" version="1" comment="postgresql-docs is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881478" version="1" comment="postgresql-plperl is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881479" version="1" comment="postgresql-plpython3 is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881480" version="1" comment="postgresql-pltcl is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881481" version="1" comment="postgresql-private-devel is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881482" version="1" comment="postgresql-private-libs is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881483" version="1" comment="postgresql-server is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881484" version="1" comment="postgresql-server-devel is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881485" version="1" comment="postgresql-static is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881486" version="1" comment="postgresql-test is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881487" version="1" comment="postgresql-test-rpm-macros is &lt;16.4-1.module+el9.4.0+22207+8466e31f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881488" version="1" comment="postgresql-upgrade is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881489" version="1" comment="postgresql-upgrade-devel is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881490" version="1" comment="postgresql is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881491" version="1" comment="postgresql-contrib is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881492" version="1" comment="postgresql-docs is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881493" version="1" comment="postgresql-plperl is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881494" version="1" comment="postgresql-plpython3 is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881495" version="1" comment="postgresql-pltcl is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881496" version="1" comment="postgresql-private-devel is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881497" version="1" comment="postgresql-private-libs is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881498" version="1" comment="postgresql-server is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881499" version="1" comment="postgresql-server-devel is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881500" version="1" comment="postgresql-static is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881501" version="1" comment="postgresql-test is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881502" version="1" comment="postgresql-upgrade is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881503" version="1" comment="postgresql-upgrade-devel is &lt;13.16-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940510" version="1" comment="python3.12 is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940511" version="1" comment="python3.12-debug is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940512" version="1" comment="python3.12-devel is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940513" version="1" comment="python3.12-idle is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940514" version="1" comment="python3.12-libs is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940515" version="1" comment="python3.12-test is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940516" version="1" comment="python3.12-tkinter is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940517" version="1" comment="nodejs is &lt;18.20.4-1.module+el9.4.0+22195+c221878e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940518" version="1" comment="nodejs-devel is &lt;18.20.4-1.module+el9.4.0+22195+c221878e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940519" version="1" comment="nodejs-docs is &lt;18.20.4-1.module+el9.4.0+22195+c221878e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940520" version="1" comment="nodejs-full-i18n is &lt;18.20.4-1.module+el9.4.0+22195+c221878e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940521" version="1" comment="npm is &lt;10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941953" version="1" comment="python3-urllib3 is &lt;1.26.5-5.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942219" version="1" comment="python-unversioned-command is &lt;3.9.18-3.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942220" version="1" comment="python3 is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942221" version="1" comment="python3-debug is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942222" version="1" comment="python3-devel is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942223" version="1" comment="python3-idle is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942224" version="1" comment="python3-libs is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942225" version="1" comment="python3-test is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942226" version="1" comment="python3-tkinter is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941954" version="1" comment="krb5-devel is &lt;1.21.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941955" version="1" comment="krb5-libs is &lt;1.21.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941956" version="1" comment="krb5-pkinit is &lt;1.21.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941957" version="1" comment="krb5-server is &lt;1.21.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941958" version="1" comment="krb5-server-ldap is &lt;1.21.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941959" version="1" comment="krb5-workstation is &lt;1.21.1-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941960" version="1" comment="libkadm5 is &lt;1.21.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942227" version="1" comment="python3.11 is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942228" version="1" comment="python3.11-debug is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942229" version="1" comment="python3.11-devel is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942230" version="1" comment="python3.11-idle is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942231" version="1" comment="python3.11-libs is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942232" version="1" comment="python3.11-test is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942233" version="1" comment="python3.11-tkinter is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941961" version="1" comment="orc is &lt;0.4.31-7.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941962" version="1" comment="orc-compiler is &lt;0.4.31-7.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941963" version="1" comment="orc-devel is &lt;0.4.31-7.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941964" version="1" comment="containernetworking-plugins is &lt;1.4.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941965" version="1" comment="gvisor-tap-vsock is &lt;0.7.3-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941966" version="1" comment="runc is &lt;1.1.12-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941967" version="1" comment="buildah is &lt;1.33.7-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941968" version="1" comment="buildah-tests is &lt;1.33.7-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941969" version="1" comment="wget is &lt;1.21.1-8.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941970" version="1" comment="podman is &lt;4.9.4-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941971" version="1" comment="podman-docker is &lt;4.9.4-10.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941972" version="1" comment="podman-plugins is &lt;4.9.4-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941973" version="1" comment="podman-remote is &lt;4.9.4-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941974" version="1" comment="podman-tests is &lt;4.9.4-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941975" version="1" comment="skopeo is &lt;1.14.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941976" version="1" comment="skopeo-tests is &lt;1.14.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942234" version="1" comment="ghostscript is &lt;9.54.0-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942235" version="1" comment="ghostscript-doc is &lt;9.54.0-17.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942236" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-17.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942237" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942238" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942239" version="1" comment="ghostscript-x11 is &lt;9.54.0-17.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942240" version="1" comment="libgs is &lt;9.54.0-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942241" version="1" comment="libgs-devel is &lt;9.54.0-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942242" version="1" comment="bubblewrap is &lt;0.4.1-7.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942243" version="1" comment="flatpak is &lt;1.12.9-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942244" version="1" comment="flatpak-libs is &lt;1.12.9-3.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942245" version="1" comment="flatpak-selinux is &lt;1.12.9-3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942246" version="1" comment="flatpak-session-helper is &lt;1.12.9-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941597" version="1" comment="glib2 is &lt;2.68.4-14.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941598" version="1" comment="glib2-devel is &lt;2.68.4-14.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941599" version="1" comment="glib2-doc is &lt;2.68.4-14.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941600" version="1" comment="glib2-static is &lt;2.68.4-14.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941601" version="1" comment="glib2-tests is &lt;2.68.4-14.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942247" version="1" comment="emacs is &lt;27.2-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942248" version="1" comment="emacs-common is &lt;27.2-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942249" version="1" comment="emacs-filesystem is &lt;27.2-10.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942250" version="1" comment="emacs-lucid is &lt;27.2-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942251" version="1" comment="emacs-nox is &lt;27.2-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942252" version="1" comment="dovecot is &lt;2.3.16-11.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942253" version="1" comment="dovecot-devel is &lt;2.3.16-11.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942254" version="1" comment="dovecot-mysql is &lt;2.3.16-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942255" version="1" comment="dovecot-pgsql is &lt;2.3.16-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942256" version="1" comment="dovecot-pigeonhole is &lt;2.3.16-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942257" version="1" comment="bpftool is &lt;7.3.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942258" version="1" comment="kernel is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942259" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.35.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942260" version="1" comment="kernel-core is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942261" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942262" version="1" comment="kernel-debug is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942263" version="1" comment="kernel-debug-core is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942266" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942267" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942268" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942269" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942272" version="1" comment="kernel-doc is &lt;5.14.0-427.35.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942273" version="1" comment="kernel-headers is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942274" version="1" comment="kernel-modules is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942275" version="1" comment="kernel-modules-core is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942276" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942277" version="1" comment="kernel-tools is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942278" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942280" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942281" version="1" comment="libperf is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942282" version="1" comment="perf is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942283" version="1" comment="python3-perf is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942284" version="1" comment="rtla is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942285" version="1" comment="rv is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945000" version="1" comment="firefox is &lt;128.2.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945001" version="1" comment="firefox-x11 is &lt;128.2.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945002" version="1" comment="thunderbird is &lt;128.2.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943028" version="1" comment="fence-agents-aliyun is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943029" version="1" comment="fence-agents-all is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943030" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943031" version="1" comment="fence-agents-apc is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943032" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943033" version="1" comment="fence-agents-aws is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943034" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943035" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943036" version="1" comment="fence-agents-brocade is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943037" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943038" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943039" version="1" comment="fence-agents-common is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943040" version="1" comment="fence-agents-compute is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943041" version="1" comment="fence-agents-drac5 is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943042" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943043" version="1" comment="fence-agents-emerson is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943044" version="1" comment="fence-agents-eps is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943045" version="1" comment="fence-agents-gce is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943046" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943047" version="1" comment="fence-agents-hpblade is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943048" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943049" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943050" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943051" version="1" comment="fence-agents-ifmib is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943052" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943053" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943054" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943055" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943056" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943057" version="1" comment="fence-agents-ipdu is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943058" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943059" version="1" comment="fence-agents-kdump is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943060" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943061" version="1" comment="fence-agents-mpath is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943062" version="1" comment="fence-agents-openstack is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943063" version="1" comment="fence-agents-redfish is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943064" version="1" comment="fence-agents-rhevm is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943065" version="1" comment="fence-agents-rsa is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943066" version="1" comment="fence-agents-rsb is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943067" version="1" comment="fence-agents-sbd is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943068" version="1" comment="fence-agents-scsi is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943069" version="1" comment="fence-agents-virsh is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943070" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943071" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943072" version="1" comment="fence-agents-wti is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943073" version="1" comment="fence-virt is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943074" version="1" comment="fence-virtd is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943075" version="1" comment="fence-virtd-cpg is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943076" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943077" version="1" comment="fence-virtd-multicast is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943078" version="1" comment="fence-virtd-serial is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943079" version="1" comment="fence-virtd-tcp is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943080" version="1" comment="ha-cloud-support is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943430" version="1" comment="expat is &lt;2.5.0-2.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943431" version="1" comment="expat-devel is &lt;2.5.0-2.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943432" version="1" comment="libnbd is &lt;1.18.1-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943433" version="1" comment="libnbd-bash-completion is &lt;1.18.1-4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943434" version="1" comment="libnbd-devel is &lt;1.18.1-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943435" version="1" comment="nbdfuse is &lt;1.18.1-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943436" version="1" comment="ocaml-libnbd is &lt;1.18.1-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943437" version="1" comment="ocaml-libnbd-devel is &lt;1.18.1-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943438" version="1" comment="python3-libnbd is &lt;1.18.1-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943439" version="1" comment="openssl is &lt;3.0.7-28.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943440" version="1" comment="openssl-devel is &lt;3.0.7-28.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943441" version="1" comment="openssl-libs is &lt;3.0.7-28.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943442" version="1" comment="openssl-perl is &lt;3.0.7-28.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943818" version="1" comment="ruby is &lt;3.3.5-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943819" version="1" comment="ruby-bundled-gems is &lt;3.3.5-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943820" version="1" comment="ruby-default-gems is &lt;3.3.5-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943821" version="1" comment="ruby-devel is &lt;3.3.5-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943822" version="1" comment="ruby-doc is &lt;3.3.5-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943823" version="1" comment="ruby-libs is &lt;3.3.5-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943824" version="1" comment="rubygem-bigdecimal is &lt;3.1.5-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943825" version="1" comment="rubygem-bundler is &lt;2.5.16-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943826" version="1" comment="rubygem-io-console is &lt;0.7.1-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943827" version="1" comment="rubygem-irb is &lt;1.13.1-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943828" version="1" comment="rubygem-json is &lt;2.7.1-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943829" version="1" comment="rubygem-minitest is &lt;5.20.0-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943830" version="1" comment="rubygem-power_assert is &lt;2.0.3-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943831" version="1" comment="rubygem-psych is &lt;5.1.2-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943832" version="1" comment="rubygem-racc is &lt;1.7.3-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943833" version="1" comment="rubygem-rake is &lt;13.1.0-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943834" version="1" comment="rubygem-rbs is &lt;3.4.0-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943835" version="1" comment="rubygem-rdoc is &lt;6.6.3.1-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943836" version="1" comment="rubygem-rexml is &lt;3.3.6-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943837" version="1" comment="rubygem-rss is &lt;0.3.1-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943838" version="1" comment="rubygem-test-unit is &lt;3.6.1-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943839" version="1" comment="rubygem-typeprof is &lt;0.21.9-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943840" version="1" comment="rubygems is &lt;3.5.16-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943841" version="1" comment="rubygems-devel is &lt;3.5.16-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943842" version="1" comment="pcp is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943843" version="1" comment="pcp-conf is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943844" version="1" comment="pcp-devel is &lt;6.2.0-5.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943845" version="1" comment="pcp-doc is &lt;6.2.0-5.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943846" version="1" comment="pcp-export-pcp2elasticsearch is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943847" version="1" comment="pcp-export-pcp2graphite is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943848" version="1" comment="pcp-export-pcp2influxdb is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943849" version="1" comment="pcp-export-pcp2json is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943850" version="1" comment="pcp-export-pcp2spark is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943851" version="1" comment="pcp-export-pcp2xml is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943852" version="1" comment="pcp-export-pcp2zabbix is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943853" version="1" comment="pcp-export-zabbix-agent is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943854" version="1" comment="pcp-geolocate is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943855" version="1" comment="pcp-gui is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943856" version="1" comment="pcp-import-collectl2pcp is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943857" version="1" comment="pcp-import-ganglia2pcp is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943858" version="1" comment="pcp-import-iostat2pcp is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943859" version="1" comment="pcp-import-mrtg2pcp is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943860" version="1" comment="pcp-import-sar2pcp is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943861" version="1" comment="pcp-libs is &lt;6.2.0-5.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943862" version="1" comment="pcp-libs-devel is &lt;6.2.0-5.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943863" version="1" comment="pcp-pmda-activemq is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943864" version="1" comment="pcp-pmda-apache is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943865" version="1" comment="pcp-pmda-bash is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943866" version="1" comment="pcp-pmda-bcc is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943867" version="1" comment="pcp-pmda-bind2 is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943868" version="1" comment="pcp-pmda-bonding is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943869" version="1" comment="pcp-pmda-bpf is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943870" version="1" comment="pcp-pmda-bpftrace is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943871" version="1" comment="pcp-pmda-cifs is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943872" version="1" comment="pcp-pmda-cisco is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943873" version="1" comment="pcp-pmda-dbping is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943874" version="1" comment="pcp-pmda-denki is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943875" version="1" comment="pcp-pmda-dm is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943876" version="1" comment="pcp-pmda-docker is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943877" version="1" comment="pcp-pmda-ds389 is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943878" version="1" comment="pcp-pmda-ds389log is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943879" version="1" comment="pcp-pmda-elasticsearch is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943880" version="1" comment="pcp-pmda-farm is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943881" version="1" comment="pcp-pmda-gfs2 is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943882" version="1" comment="pcp-pmda-gluster is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943883" version="1" comment="pcp-pmda-gpfs is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943884" version="1" comment="pcp-pmda-gpsd is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943885" version="1" comment="pcp-pmda-hacluster is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943886" version="1" comment="pcp-pmda-haproxy is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943887" version="1" comment="pcp-pmda-infiniband is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943888" version="1" comment="pcp-pmda-json is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943889" version="1" comment="pcp-pmda-libvirt is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943890" version="1" comment="pcp-pmda-lio is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943891" version="1" comment="pcp-pmda-lmsensors is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943892" version="1" comment="pcp-pmda-logger is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943893" version="1" comment="pcp-pmda-lustre is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943894" version="1" comment="pcp-pmda-lustrecomm is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943895" version="1" comment="pcp-pmda-mailq is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943896" version="1" comment="pcp-pmda-memcache is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943897" version="1" comment="pcp-pmda-mic is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943898" version="1" comment="pcp-pmda-mongodb is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943899" version="1" comment="pcp-pmda-mounts is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943900" version="1" comment="pcp-pmda-mssql is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943901" version="1" comment="pcp-pmda-mysql is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943902" version="1" comment="pcp-pmda-named is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943903" version="1" comment="pcp-pmda-netcheck is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943904" version="1" comment="pcp-pmda-netfilter is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943905" version="1" comment="pcp-pmda-news is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943906" version="1" comment="pcp-pmda-nfsclient is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943907" version="1" comment="pcp-pmda-nginx is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943908" version="1" comment="pcp-pmda-nvidia-gpu is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943909" version="1" comment="pcp-pmda-openmetrics is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943910" version="1" comment="pcp-pmda-openvswitch is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943911" version="1" comment="pcp-pmda-oracle is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943912" version="1" comment="pcp-pmda-pdns is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943913" version="1" comment="pcp-pmda-perfevent is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943914" version="1" comment="pcp-pmda-podman is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943915" version="1" comment="pcp-pmda-postfix is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943916" version="1" comment="pcp-pmda-postgresql is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943917" version="1" comment="pcp-pmda-rabbitmq is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943918" version="1" comment="pcp-pmda-redis is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943919" version="1" comment="pcp-pmda-resctrl is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943920" version="1" comment="pcp-pmda-roomtemp is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943921" version="1" comment="pcp-pmda-rsyslog is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943922" version="1" comment="pcp-pmda-samba is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943923" version="1" comment="pcp-pmda-sendmail is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943924" version="1" comment="pcp-pmda-shping is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943925" version="1" comment="pcp-pmda-slurm is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943926" version="1" comment="pcp-pmda-smart is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943927" version="1" comment="pcp-pmda-snmp is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943928" version="1" comment="pcp-pmda-sockets is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943929" version="1" comment="pcp-pmda-statsd is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943930" version="1" comment="pcp-pmda-summary is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943931" version="1" comment="pcp-pmda-systemd is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943932" version="1" comment="pcp-pmda-trace is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943933" version="1" comment="pcp-pmda-unbound is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943934" version="1" comment="pcp-pmda-weblog is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943935" version="1" comment="pcp-pmda-zimbra is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943936" version="1" comment="pcp-pmda-zswap is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943937" version="1" comment="pcp-selinux is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943938" version="1" comment="pcp-system-tools is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943939" version="1" comment="pcp-zeroconf is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943940" version="1" comment="perl-PCP-LogImport is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943941" version="1" comment="perl-PCP-LogSummary is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943942" version="1" comment="perl-PCP-MMV is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943943" version="1" comment="perl-PCP-PMDA is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943944" version="1" comment="python3-pcp is &lt;6.2.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944120" version="1" comment="go-toolset is &lt;1.21.13-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944121" version="1" comment="golang is &lt;1.21.13-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944122" version="1" comment="golang-bin is &lt;1.21.13-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944123" version="1" comment="golang-docs is &lt;1.21.13-3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944124" version="1" comment="golang-misc is &lt;1.21.13-3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944125" version="1" comment="golang-src is &lt;1.21.13-3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944126" version="1" comment="golang-tests is &lt;1.21.13-3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944459" version="1" comment="grafana-pcp is &lt;5.1.1-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944460" version="1" comment="grafana is &lt;9.2.10-17.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944461" version="1" comment="grafana-selinux is &lt;9.2.10-17.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944684" version="1" comment="bpftool is &lt;7.3.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944685" version="1" comment="kernel is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944686" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.37.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944687" version="1" comment="kernel-core is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944688" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944689" version="1" comment="kernel-debug is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944690" version="1" comment="kernel-debug-core is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944693" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944694" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944695" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944696" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944699" version="1" comment="kernel-doc is &lt;5.14.0-427.37.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944700" version="1" comment="kernel-headers is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944701" version="1" comment="kernel-modules is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944702" version="1" comment="kernel-modules-core is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944703" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944704" version="1" comment="kernel-tools is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944705" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944707" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944708" version="1" comment="libperf is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944709" version="1" comment="perf is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944710" version="1" comment="python3-perf is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944711" version="1" comment="rtla is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944712" version="1" comment="rv is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944793" version="1" comment="git-lfs is &lt;3.4.1-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945003" version="1" comment="net-snmp is &lt;5.9.1-13.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945004" version="1" comment="net-snmp-agent-libs is &lt;5.9.1-13.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945005" version="1" comment="net-snmp-devel is &lt;5.9.1-13.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945006" version="1" comment="net-snmp-libs is &lt;5.9.1-13.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945007" version="1" comment="net-snmp-perl is &lt;5.9.1-13.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945008" version="1" comment="net-snmp-utils is &lt;5.9.1-13.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945009" version="1" comment="python3-net-snmp is &lt;5.9.1-13.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945283" version="1" comment="cups-filters is &lt;1.28.7-17.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945284" version="1" comment="cups-filters-devel is &lt;1.28.7-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945285" version="1" comment="cups-filters-libs is &lt;1.28.7-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945415" version="1" comment="iwl100-firmware is &lt;39.31.5.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945416" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945417" version="1" comment="iwl105-firmware is &lt;18.168.6.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945418" version="1" comment="iwl135-firmware is &lt;18.168.6.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945419" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945420" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945421" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945422" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945423" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945424" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945425" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945426" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945427" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945428" version="1" comment="libertas-sd8787-firmware is &lt;20240905-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945429" version="1" comment="linux-firmware is &lt;20240905-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945430" version="1" comment="linux-firmware-whence is &lt;20240905-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945431" version="1" comment="netronome-firmware is &lt;20240905-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945529" version="1" comment="firefox is &lt;128.3.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945530" version="1" comment="firefox-x11 is &lt;128.3.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945478" version="1" comment="go-toolset is &lt;1.21.13-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945479" version="1" comment="golang is &lt;1.21.13-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945480" version="1" comment="golang-bin is &lt;1.21.13-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945481" version="1" comment="golang-docs is &lt;1.21.13-4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945482" version="1" comment="golang-misc is &lt;1.21.13-4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945483" version="1" comment="golang-src is &lt;1.21.13-4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945484" version="1" comment="golang-tests is &lt;1.21.13-4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945531" version="1" comment="thunderbird is &lt;128.3.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946449" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.35-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946450" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.35-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946451" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.35-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946452" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.35-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946453" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.35-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946454" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.135-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946455" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.135-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946456" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.35-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946457" version="1" comment="dotnet-templates-6.0 is &lt;6.0.135-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946458" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946459" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946460" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946461" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946462" version="1" comment="dotnet-host is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946463" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946464" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946465" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946466" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.110-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946467" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.110-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946468" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.110-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946469" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946470" version="1" comment="dotnet-templates-8.0 is &lt;8.0.110-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946471" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.110-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947295" version="1" comment="firefox is &lt;128.3.1-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947296" version="1" comment="firefox-x11 is &lt;128.3.1-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947412" version="1" comment="thunderbird is &lt;128.3.1-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947336" version="1" comment="OpenIPMI is &lt;2.0.32-5.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947337" version="1" comment="OpenIPMI-devel is &lt;2.0.32-5.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947338" version="1" comment="OpenIPMI-lanserv is &lt;2.0.32-5.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947339" version="1" comment="OpenIPMI-libs is &lt;2.0.32-5.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947340" version="1" comment="podman is &lt;4.9.4-13.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947341" version="1" comment="podman-docker is &lt;4.9.4-13.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947342" version="1" comment="podman-plugins is &lt;4.9.4-13.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947343" version="1" comment="podman-remote is &lt;4.9.4-13.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947344" version="1" comment="podman-tests is &lt;4.9.4-13.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948303" version="1" comment="containernetworking-plugins is &lt;1.4.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948304" version="1" comment="skopeo is &lt;1.14.5-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948305" version="1" comment="skopeo-tests is &lt;1.14.5-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948496" version="1" comment="buildah is &lt;1.33.9-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948497" version="1" comment="buildah-tests is &lt;1.33.9-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947853" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947854" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.432.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947855" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.432.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947856" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.432.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947857" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947858" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947859" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947860" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947861" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947862" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947863" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947864" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947865" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947866" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947867" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.432.b06-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947868" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.432.b06-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947869" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947870" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947871" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947872" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947743" version="1" comment="java-11-openjdk is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947744" version="1" comment="java-11-openjdk-demo is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947745" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947746" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947747" version="1" comment="java-11-openjdk-devel is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947748" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947749" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947750" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947751" version="1" comment="java-11-openjdk-headless is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947752" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947753" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947754" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947755" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947756" version="1" comment="java-11-openjdk-jmods is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947757" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947758" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947759" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947760" version="1" comment="java-11-openjdk-src is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947761" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947762" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947763" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947764" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947765" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947873" version="1" comment="java-17-openjdk is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947874" version="1" comment="java-17-openjdk-demo is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947875" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947876" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947877" version="1" comment="java-17-openjdk-devel is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947878" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947879" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947880" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947881" version="1" comment="java-17-openjdk-headless is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947882" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947883" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947884" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947885" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947886" version="1" comment="java-17-openjdk-jmods is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947887" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947888" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947889" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947890" version="1" comment="java-17-openjdk-src is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947891" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947892" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947893" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947894" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947895" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948242" version="1" comment="java-21-openjdk is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948243" version="1" comment="java-21-openjdk-demo is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948244" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948245" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948246" version="1" comment="java-21-openjdk-devel is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948247" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948248" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948249" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948250" version="1" comment="java-21-openjdk-headless is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948251" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948252" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948253" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948254" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948255" version="1" comment="java-21-openjdk-jmods is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948256" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948257" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948258" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948259" version="1" comment="java-21-openjdk-src is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948260" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948261" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948262" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948263" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948264" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947775" version="1" comment="bpftool is &lt;7.3.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947776" version="1" comment="kernel is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947777" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.40.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947778" version="1" comment="kernel-core is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947779" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947780" version="1" comment="kernel-debug is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947781" version="1" comment="kernel-debug-core is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947784" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947785" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947786" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947787" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947790" version="1" comment="kernel-doc is &lt;5.14.0-427.40.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947791" version="1" comment="kernel-headers is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947792" version="1" comment="kernel-modules is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947793" version="1" comment="kernel-modules-core is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947794" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947795" version="1" comment="kernel-tools is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947796" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947798" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947799" version="1" comment="libperf is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947800" version="1" comment="perf is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947801" version="1" comment="python3-perf is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947802" version="1" comment="rtla is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947803" version="1" comment="rv is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948274" version="1" comment="webkit2gtk3 is &lt;2.46.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948275" version="1" comment="webkit2gtk3-devel is &lt;2.46.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948276" version="1" comment="webkit2gtk3-jsc is &lt;2.46.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948277" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948432" version="1" comment="python3.11 is &lt;3.11.7-1.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948433" version="1" comment="python3.11-debug is &lt;3.11.7-1.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948434" version="1" comment="python3.11-devel is &lt;3.11.7-1.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948435" version="1" comment="python3.11-idle is &lt;3.11.7-1.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948436" version="1" comment="python3.11-libs is &lt;3.11.7-1.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948437" version="1" comment="python3.11-test is &lt;3.11.7-1.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948438" version="1" comment="python3.11-tkinter is &lt;3.11.7-1.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948439" version="1" comment="python-unversioned-command is &lt;3.9.18-3.el9_4.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948440" version="1" comment="python3 is &lt;3.9.18-3.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948441" version="1" comment="python3-debug is &lt;3.9.18-3.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948442" version="1" comment="python3-devel is &lt;3.9.18-3.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948443" version="1" comment="python3-idle is &lt;3.9.18-3.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948444" version="1" comment="python3-libs is &lt;3.9.18-3.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948445" version="1" comment="python3-test is &lt;3.9.18-3.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948446" version="1" comment="python3-tkinter is &lt;3.9.18-3.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948447" version="1" comment="python3.12 is &lt;3.12.1-4.el9_4.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948448" version="1" comment="python3.12-debug is &lt;3.12.1-4.el9_4.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948449" version="1" comment="python3.12-devel is &lt;3.12.1-4.el9_4.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948450" version="1" comment="python3.12-idle is &lt;3.12.1-4.el9_4.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948451" version="1" comment="python3.12-libs is &lt;3.12.1-4.el9_4.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948452" version="1" comment="python3.12-test is &lt;3.12.1-4.el9_4.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948453" version="1" comment="python3.12-tkinter is &lt;3.12.1-4.el9_4.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948625" version="1" comment="buildah is &lt;1.33.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948626" version="1" comment="buildah-tests is &lt;1.33.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950334" version="1" comment="bpftool is &lt;7.3.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950335" version="1" comment="kernel is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950336" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.42.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950337" version="1" comment="kernel-core is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950338" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950339" version="1" comment="kernel-debug is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950340" version="1" comment="kernel-debug-core is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950343" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950344" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950345" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950346" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950349" version="1" comment="kernel-doc is &lt;5.14.0-427.42.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950350" version="1" comment="kernel-headers is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950351" version="1" comment="kernel-modules is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950352" version="1" comment="kernel-modules-core is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950353" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950354" version="1" comment="kernel-tools is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950355" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950357" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950358" version="1" comment="libperf is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950359" version="1" comment="perf is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950360" version="1" comment="python3-perf is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950361" version="1" comment="rtla is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950362" version="1" comment="rv is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950363" version="1" comment="grafana is &lt;9.2.10-19.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950364" version="1" comment="grafana-selinux is &lt;9.2.10-19.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950377" version="1" comment="mod_http2 is &lt;2.0.26-2.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950852" version="1" comment="firefox is &lt;128.4.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950853" version="1" comment="firefox-x11 is &lt;128.4.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951425" version="1" comment="thunderbird is &lt;128.4.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951338" version="1" comment="openexr is &lt;3.1.1-2.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951339" version="1" comment="openexr-devel is &lt;3.1.1-2.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951340" version="1" comment="openexr-libs is &lt;3.1.1-2.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951341" version="1" comment="libtiff is &lt;4.4.0-12.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951342" version="1" comment="libtiff-devel is &lt;4.4.0-12.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951343" version="1" comment="libtiff-tools is &lt;4.4.0-12.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951344" version="1" comment="edk2-ovmf is &lt;20231122-6.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951345" version="1" comment="edk2-tools is &lt;20231122-6.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951346" version="1" comment="edk2-tools-doc is &lt;20231122-6.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951868" version="1" comment="podman is &lt;4.9.4-16.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951869" version="1" comment="podman-docker is &lt;4.9.4-16.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951870" version="1" comment="podman-plugins is &lt;4.9.4-16.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951871" version="1" comment="podman-remote is &lt;4.9.4-16.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951872" version="1" comment="podman-tests is &lt;4.9.4-16.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953529" version="1" comment="edk2-ovmf is &lt;20240524-6.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953530" version="1" comment="edk2-tools is &lt;20240524-6.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953531" version="1" comment="edk2-tools-doc is &lt;20240524-6.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953532" version="1" comment="containernetworking-plugins is &lt;1.5.1-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953533" version="1" comment="freerdp is &lt;2.11.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953534" version="1" comment="freerdp-devel is &lt;2.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953535" version="1" comment="freerdp-libs is &lt;2.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953536" version="1" comment="libwinpr is &lt;2.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953537" version="1" comment="libwinpr-devel is &lt;2.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953538" version="1" comment="xorg-x11-server-Xwayland is &lt;23.2.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953539" version="1" comment="xorg-x11-server-Xwayland-devel is &lt;23.2.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953540" version="1" comment="buildah is &lt;1.37.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953541" version="1" comment="buildah-tests is &lt;1.37.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953542" version="1" comment="skopeo is &lt;1.16.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953543" version="1" comment="skopeo-tests is &lt;1.16.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953544" version="1" comment="podman is &lt;5.2.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953545" version="1" comment="podman-docker is &lt;5.2.2-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953546" version="1" comment="podman-plugins is &lt;5.2.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953547" version="1" comment="podman-remote is &lt;5.2.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953548" version="1" comment="podman-tests is &lt;5.2.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953549" version="1" comment="gnome-classic-session is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953550" version="1" comment="gnome-shell is &lt;40.10-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953551" version="1" comment="gnome-shell-extension-apps-menu is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953552" version="1" comment="gnome-shell-extension-auto-move-windows is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953553" version="1" comment="gnome-shell-extension-classification-banner is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953554" version="1" comment="gnome-shell-extension-common is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953555" version="1" comment="gnome-shell-extension-custom-menu is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953556" version="1" comment="gnome-shell-extension-dash-to-dock is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953557" version="1" comment="gnome-shell-extension-dash-to-panel is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953558" version="1" comment="gnome-shell-extension-desktop-icons is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953559" version="1" comment="gnome-shell-extension-drive-menu is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953560" version="1" comment="gnome-shell-extension-gesture-inhibitor is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953561" version="1" comment="gnome-shell-extension-heads-up-display is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953562" version="1" comment="gnome-shell-extension-launch-new-instance is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953563" version="1" comment="gnome-shell-extension-native-window-placement is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953564" version="1" comment="gnome-shell-extension-panel-favorites is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953565" version="1" comment="gnome-shell-extension-places-menu is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953566" version="1" comment="gnome-shell-extension-screenshot-window-sizer is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953567" version="1" comment="gnome-shell-extension-systemMonitor is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953568" version="1" comment="gnome-shell-extension-top-icons is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953569" version="1" comment="gnome-shell-extension-updates-dialog is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953570" version="1" comment="gnome-shell-extension-user-theme is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953571" version="1" comment="gnome-shell-extension-window-list is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953572" version="1" comment="gnome-shell-extension-windowsNavigator is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953573" version="1" comment="gnome-shell-extension-workspace-indicator is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953574" version="1" comment="grafana is &lt;10.2.6-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953575" version="1" comment="grafana-selinux is &lt;10.2.6-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953576" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953577" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953578" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953579" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953580" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953581" version="1" comment="xorg-x11-server-common is &lt;1.20.11-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953582" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-26.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953583" version="1" comment="xorg-x11-server-source is &lt;1.20.11-26.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953584" version="1" comment="libvirt is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953585" version="1" comment="libvirt-client is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953586" version="1" comment="libvirt-client-qemu is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953587" version="1" comment="libvirt-daemon is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953588" version="1" comment="libvirt-daemon-common is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953589" version="1" comment="libvirt-daemon-config-network is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953590" version="1" comment="libvirt-daemon-config-nwfilter is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953591" version="1" comment="libvirt-daemon-driver-interface is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953592" version="1" comment="libvirt-daemon-driver-network is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953593" version="1" comment="libvirt-daemon-driver-nodedev is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953594" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953595" version="1" comment="libvirt-daemon-driver-qemu is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953596" version="1" comment="libvirt-daemon-driver-secret is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953597" version="1" comment="libvirt-daemon-driver-storage is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953598" version="1" comment="libvirt-daemon-driver-storage-core is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953599" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953600" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953601" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953602" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953603" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953604" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953605" version="1" comment="libvirt-daemon-kvm is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953606" version="1" comment="libvirt-daemon-lock is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953607" version="1" comment="libvirt-daemon-log is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953608" version="1" comment="libvirt-daemon-plugin-lockd is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953609" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953610" version="1" comment="libvirt-daemon-proxy is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953611" version="1" comment="libvirt-devel is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953612" version="1" comment="libvirt-docs is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953613" version="1" comment="libvirt-libs is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953614" version="1" comment="libvirt-nss is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953615" version="1" comment="libvirt-ssh-proxy is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953616" version="1" comment="qemu-guest-agent is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953617" version="1" comment="qemu-img is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953618" version="1" comment="qemu-kvm is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953619" version="1" comment="qemu-kvm-audio-pa is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953620" version="1" comment="qemu-kvm-block-blkio is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953621" version="1" comment="qemu-kvm-block-curl is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953622" version="1" comment="qemu-kvm-block-rbd is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953623" version="1" comment="qemu-kvm-common is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953624" version="1" comment="qemu-kvm-core is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953625" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953626" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953627" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953628" version="1" comment="qemu-kvm-device-usb-host is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953629" version="1" comment="qemu-kvm-device-usb-redirect is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953630" version="1" comment="qemu-kvm-docs is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953631" version="1" comment="qemu-kvm-tools is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953632" version="1" comment="qemu-kvm-ui-egl-headless is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953633" version="1" comment="qemu-kvm-ui-opengl is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953634" version="1" comment="qemu-pr-helper is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953635" version="1" comment="webkit2gtk3 is &lt;2.44.3-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953636" version="1" comment="webkit2gtk3-devel is &lt;2.44.3-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953637" version="1" comment="webkit2gtk3-jsc is &lt;2.44.3-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953638" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.44.3-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953639" version="1" comment="python3-jinja2 is &lt;2.11.3-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953640" version="1" comment="lldpd is &lt;1.0.18-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953641" version="1" comment="lldpd-devel is &lt;1.0.18-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953642" version="1" comment="poppler is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953643" version="1" comment="poppler-cpp is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953644" version="1" comment="poppler-cpp-devel is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953645" version="1" comment="poppler-devel is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953646" version="1" comment="poppler-glib is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953647" version="1" comment="poppler-glib-devel is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953648" version="1" comment="poppler-glib-doc is &lt;21.01.0-21.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953649" version="1" comment="poppler-qt5 is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953650" version="1" comment="poppler-qt5-devel is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953651" version="1" comment="poppler-utils is &lt;21.01.0-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953652" version="1" comment="mod_auth_openidc is &lt;2.4.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953653" version="1" comment="jose is &lt;14-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953654" version="1" comment="libjose is &lt;14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953655" version="1" comment="libjose-devel is &lt;14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953656" version="1" comment="gtk-update-icon-cache is &lt;3.24.31-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953657" version="1" comment="gtk3 is &lt;3.24.31-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953658" version="1" comment="gtk3-devel is &lt;3.24.31-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953659" version="1" comment="gtk3-devel-docs is &lt;3.24.31-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953660" version="1" comment="gtk3-immodule-xim is &lt;3.24.31-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953661" version="1" comment="iperf3 is &lt;3.9-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953662" version="1" comment="bcc is &lt;0.30.0-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953663" version="1" comment="bcc-devel is &lt;0.30.0-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953664" version="1" comment="bcc-doc is &lt;0.30.0-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953665" version="1" comment="bcc-tools is &lt;0.30.0-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953666" version="1" comment="libbpf-tools is &lt;0.30.0-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953667" version="1" comment="python3-bcc is &lt;0.30.0-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953668" version="1" comment="bpftrace is &lt;0.21.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953669" version="1" comment="python3.12 is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953670" version="1" comment="python3.12-debug is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953671" version="1" comment="python3.12-devel is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953672" version="1" comment="python3.12-idle is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953673" version="1" comment="python3.12-libs is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953674" version="1" comment="python3.12-test is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953675" version="1" comment="python3.12-tkinter is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951961" version="1" comment="python3.11 is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951962" version="1" comment="python3.11-debug is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951963" version="1" comment="python3.11-devel is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951964" version="1" comment="python3.11-idle is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951965" version="1" comment="python3.11-libs is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951966" version="1" comment="python3.11-test is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951967" version="1" comment="python3.11-tkinter is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953676" version="1" comment="python3.12-PyMySQL is &lt;1.1.0-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953677" version="1" comment="python3.12-PyMySQL+rsa is &lt;1.1.0-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953678" version="1" comment="python3.11-PyMySQL is &lt;1.0.2-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953679" version="1" comment="python3.11-PyMySQL+rsa is &lt;1.0.2-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953680" version="1" comment="cyrus-imapd is &lt;3.4.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953681" version="1" comment="cyrus-imapd-libs is &lt;3.4.8-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953682" version="1" comment="cyrus-imapd-utils is &lt;3.4.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953683" version="1" comment="perl-Cyrus is &lt;3.4.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953684" version="1" comment="runc is &lt;1.1.13-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953685" version="1" comment="postfix is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953686" version="1" comment="postfix-cdb is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953687" version="1" comment="postfix-ldap is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953688" version="1" comment="postfix-lmdb is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953689" version="1" comment="postfix-mysql is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953690" version="1" comment="postfix-pcre is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953691" version="1" comment="postfix-perl-scripts is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953692" version="1" comment="postfix-pgsql is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953693" version="1" comment="postfix-sqlite is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953694" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953695" version="1" comment="python3-jwcrypto is &lt;1.5.6-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953696" version="1" comment="emacs is &lt;27.2-10.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953697" version="1" comment="emacs-common is &lt;27.2-10.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953698" version="1" comment="emacs-filesystem is &lt;27.2-10.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953699" version="1" comment="emacs-lucid is &lt;27.2-10.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953700" version="1" comment="emacs-nox is &lt;27.2-10.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953701" version="1" comment="httpd is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953702" version="1" comment="httpd-core is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953703" version="1" comment="httpd-devel is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953704" version="1" comment="httpd-filesystem is &lt;2.4.62-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953705" version="1" comment="httpd-manual is &lt;2.4.62-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953706" version="1" comment="httpd-tools is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953707" version="1" comment="mod_ldap is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953708" version="1" comment="mod_lua is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953709" version="1" comment="mod_proxy_html is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953710" version="1" comment="mod_session is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953711" version="1" comment="mod_ssl is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953712" version="1" comment="NetworkManager is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953713" version="1" comment="NetworkManager-adsl is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953714" version="1" comment="NetworkManager-bluetooth is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953715" version="1" comment="NetworkManager-cloud-setup is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953716" version="1" comment="NetworkManager-config-connectivity-suse is &lt;1.48.10-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953717" version="1" comment="NetworkManager-config-server is &lt;1.48.10-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953718" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.48.10-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953719" version="1" comment="NetworkManager-initscripts-updown is &lt;1.48.10-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953720" version="1" comment="NetworkManager-libnm is &lt;1.48.10-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953721" version="1" comment="NetworkManager-libnm-devel is &lt;1.48.10-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953722" version="1" comment="NetworkManager-ovs is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953723" version="1" comment="NetworkManager-ppp is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953724" version="1" comment="NetworkManager-team is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953725" version="1" comment="NetworkManager-tui is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953726" version="1" comment="NetworkManager-wifi is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953727" version="1" comment="NetworkManager-wwan is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953728" version="1" comment="cockpit is &lt;323.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953729" version="1" comment="cockpit-bridge is &lt;323.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953730" version="1" comment="cockpit-doc is &lt;323.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953731" version="1" comment="cockpit-packagekit is &lt;323.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953732" version="1" comment="cockpit-pcp is &lt;323.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953733" version="1" comment="cockpit-storaged is &lt;323.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953734" version="1" comment="cockpit-system is &lt;323.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953735" version="1" comment="cockpit-ws is &lt;323.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953736" version="1" comment="krb5-devel is &lt;1.21.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953737" version="1" comment="krb5-libs is &lt;1.21.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953738" version="1" comment="krb5-pkinit is &lt;1.21.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953739" version="1" comment="krb5-server is &lt;1.21.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953740" version="1" comment="krb5-server-ldap is &lt;1.21.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953741" version="1" comment="krb5-workstation is &lt;1.21.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953742" version="1" comment="libkadm5 is &lt;1.21.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953743" version="1" comment="openssl is &lt;3.2.2-6.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953744" version="1" comment="openssl-devel is &lt;3.2.2-6.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953745" version="1" comment="openssl-fips-provider is &lt;3.0.7-6.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953746" version="1" comment="openssl-fips-provider-so is &lt;3.0.7-6.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953747" version="1" comment="openssl-libs is &lt;3.2.2-6.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953748" version="1" comment="openssl-perl is &lt;3.2.2-6.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951968" version="1" comment="python-unversioned-command is &lt;3.9.19-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951969" version="1" comment="python3 is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951970" version="1" comment="python3-debug is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951971" version="1" comment="python3-devel is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951972" version="1" comment="python3-idle is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951973" version="1" comment="python3-libs is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951974" version="1" comment="python3-test is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951975" version="1" comment="python3-tkinter is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954004" version="1" comment="microcode_ctl is &lt;20240910-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953749" version="1" comment="libgcrypt is &lt;1.10.0-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953750" version="1" comment="libgcrypt-devel is &lt;1.10.0-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953751" version="1" comment="vim-X11 is &lt;8.2.2637-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953752" version="1" comment="vim-common is &lt;8.2.2637-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953753" version="1" comment="vim-enhanced is &lt;8.2.2637-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953754" version="1" comment="vim-filesystem is &lt;8.2.2637-21.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953755" version="1" comment="vim-minimal is &lt;8.2.2637-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953756" version="1" comment="bluez is &lt;5.72-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953757" version="1" comment="bluez-cups is &lt;5.72-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953758" version="1" comment="bluez-libs is &lt;5.72-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953759" version="1" comment="bluez-libs-devel is &lt;5.72-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953760" version="1" comment="bluez-obexd is &lt;5.72-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953761" version="1" comment="python3-dns is &lt;2.6.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953762" version="1" comment="tpm2-tools is &lt;5.2-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953763" version="1" comment="nano is &lt;5.6.1-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953764" version="1" comment="fontforge is &lt;20201107-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953765" version="1" comment="mingw32-glib2 is &lt;2.78.6-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953766" version="1" comment="mingw32-glib2-static is &lt;2.78.6-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953767" version="1" comment="mingw64-glib2 is &lt;2.78.6-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953768" version="1" comment="mingw64-glib2-static is &lt;2.78.6-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953769" version="1" comment="bubblewrap is &lt;0.4.1-8.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953770" version="1" comment="flatpak is &lt;1.12.9-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953771" version="1" comment="flatpak-devel is &lt;1.12.9-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953772" version="1" comment="flatpak-libs is &lt;1.12.9-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953773" version="1" comment="flatpak-selinux is &lt;1.12.9-3.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953774" version="1" comment="flatpak-session-helper is &lt;1.12.9-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953775" version="1" comment="python3.11 is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953776" version="1" comment="python3.11-debug is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953777" version="1" comment="python3.11-devel is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953778" version="1" comment="python3.11-idle is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953779" version="1" comment="python3.11-libs is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953780" version="1" comment="python3.11-test is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953781" version="1" comment="python3.11-tkinter is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953782" version="1" comment="python3.12 is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953783" version="1" comment="python3.12-debug is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953784" version="1" comment="python3.12-devel is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953785" version="1" comment="python3.12-idle is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953786" version="1" comment="python3.12-libs is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953787" version="1" comment="python3.12-test is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953788" version="1" comment="python3.12-tkinter is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953789" version="1" comment="pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953790" version="1" comment="pcp-conf is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953791" version="1" comment="pcp-devel is &lt;6.2.2-7.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953792" version="1" comment="pcp-doc is &lt;6.2.2-7.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953793" version="1" comment="pcp-export-pcp2elasticsearch is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953794" version="1" comment="pcp-export-pcp2graphite is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953795" version="1" comment="pcp-export-pcp2influxdb is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953796" version="1" comment="pcp-export-pcp2json is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953797" version="1" comment="pcp-export-pcp2openmetrics is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953798" version="1" comment="pcp-export-pcp2spark is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953799" version="1" comment="pcp-export-pcp2xml is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953800" version="1" comment="pcp-export-pcp2zabbix is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953801" version="1" comment="pcp-export-zabbix-agent is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953802" version="1" comment="pcp-geolocate is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953803" version="1" comment="pcp-gui is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953804" version="1" comment="pcp-import-collectl2pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953805" version="1" comment="pcp-import-ganglia2pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953806" version="1" comment="pcp-import-iostat2pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953807" version="1" comment="pcp-import-mrtg2pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953808" version="1" comment="pcp-import-sar2pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953809" version="1" comment="pcp-libs is &lt;6.2.2-7.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953810" version="1" comment="pcp-libs-devel is &lt;6.2.2-7.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953811" version="1" comment="pcp-pmda-activemq is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953812" version="1" comment="pcp-pmda-apache is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953813" version="1" comment="pcp-pmda-bash is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953814" version="1" comment="pcp-pmda-bcc is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953815" version="1" comment="pcp-pmda-bind2 is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953816" version="1" comment="pcp-pmda-bonding is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953817" version="1" comment="pcp-pmda-bpf is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953818" version="1" comment="pcp-pmda-bpftrace is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953819" version="1" comment="pcp-pmda-cifs is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953820" version="1" comment="pcp-pmda-cisco is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953821" version="1" comment="pcp-pmda-dbping is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953822" version="1" comment="pcp-pmda-denki is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953823" version="1" comment="pcp-pmda-dm is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953824" version="1" comment="pcp-pmda-docker is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953825" version="1" comment="pcp-pmda-ds389 is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953826" version="1" comment="pcp-pmda-ds389log is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953827" version="1" comment="pcp-pmda-elasticsearch is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953828" version="1" comment="pcp-pmda-farm is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953829" version="1" comment="pcp-pmda-gfs2 is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953830" version="1" comment="pcp-pmda-gluster is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953831" version="1" comment="pcp-pmda-gpfs is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953832" version="1" comment="pcp-pmda-gpsd is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953833" version="1" comment="pcp-pmda-hacluster is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953834" version="1" comment="pcp-pmda-haproxy is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953835" version="1" comment="pcp-pmda-infiniband is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953836" version="1" comment="pcp-pmda-json is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953837" version="1" comment="pcp-pmda-libvirt is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953838" version="1" comment="pcp-pmda-lio is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953839" version="1" comment="pcp-pmda-lmsensors is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953840" version="1" comment="pcp-pmda-logger is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953841" version="1" comment="pcp-pmda-lustre is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953842" version="1" comment="pcp-pmda-lustrecomm is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953843" version="1" comment="pcp-pmda-mailq is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953844" version="1" comment="pcp-pmda-memcache is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953845" version="1" comment="pcp-pmda-mic is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953846" version="1" comment="pcp-pmda-mongodb is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953847" version="1" comment="pcp-pmda-mounts is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953848" version="1" comment="pcp-pmda-mssql is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953849" version="1" comment="pcp-pmda-mysql is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953850" version="1" comment="pcp-pmda-named is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953851" version="1" comment="pcp-pmda-netcheck is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953852" version="1" comment="pcp-pmda-netfilter is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953853" version="1" comment="pcp-pmda-news is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953854" version="1" comment="pcp-pmda-nfsclient is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953855" version="1" comment="pcp-pmda-nginx is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953856" version="1" comment="pcp-pmda-nvidia-gpu is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953857" version="1" comment="pcp-pmda-openmetrics is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953858" version="1" comment="pcp-pmda-openvswitch is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953859" version="1" comment="pcp-pmda-oracle is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953860" version="1" comment="pcp-pmda-pdns is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953861" version="1" comment="pcp-pmda-perfevent is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953862" version="1" comment="pcp-pmda-podman is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953863" version="1" comment="pcp-pmda-postfix is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953864" version="1" comment="pcp-pmda-postgresql is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953865" version="1" comment="pcp-pmda-rabbitmq is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953866" version="1" comment="pcp-pmda-redis is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953867" version="1" comment="pcp-pmda-resctrl is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953868" version="1" comment="pcp-pmda-roomtemp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953869" version="1" comment="pcp-pmda-rsyslog is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953870" version="1" comment="pcp-pmda-samba is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953871" version="1" comment="pcp-pmda-sendmail is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953872" version="1" comment="pcp-pmda-shping is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953873" version="1" comment="pcp-pmda-slurm is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953874" version="1" comment="pcp-pmda-smart is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953875" version="1" comment="pcp-pmda-snmp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953876" version="1" comment="pcp-pmda-sockets is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953877" version="1" comment="pcp-pmda-statsd is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953878" version="1" comment="pcp-pmda-summary is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953879" version="1" comment="pcp-pmda-systemd is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953880" version="1" comment="pcp-pmda-trace is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953881" version="1" comment="pcp-pmda-unbound is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953882" version="1" comment="pcp-pmda-uwsgi is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953883" version="1" comment="pcp-pmda-weblog is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953884" version="1" comment="pcp-pmda-zimbra is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953885" version="1" comment="pcp-pmda-zswap is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953886" version="1" comment="pcp-selinux is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953887" version="1" comment="pcp-system-tools is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953888" version="1" comment="pcp-zeroconf is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953889" version="1" comment="perl-PCP-LogImport is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953890" version="1" comment="perl-PCP-LogSummary is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953891" version="1" comment="perl-PCP-MMV is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953892" version="1" comment="perl-PCP-PMDA is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953893" version="1" comment="python3-pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953894" version="1" comment="podman is &lt;5.2.2-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953895" version="1" comment="podman-docker is &lt;5.2.2-9.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953896" version="1" comment="podman-plugins is &lt;5.2.2-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953897" version="1" comment="podman-remote is &lt;5.2.2-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953898" version="1" comment="podman-tests is &lt;5.2.2-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953899" version="1" comment="python3.12-urllib3 is &lt;1.26.18-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953900" version="1" comment="python3.11-urllib3 is &lt;1.26.12-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953901" version="1" comment="buildah is &lt;1.37.5-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953902" version="1" comment="buildah-tests is &lt;1.37.5-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953903" version="1" comment="python-unversioned-command is &lt;3.9.19-8.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953904" version="1" comment="python3 is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953905" version="1" comment="python3-debug is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953906" version="1" comment="python3-devel is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953907" version="1" comment="python3-idle is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953908" version="1" comment="python3-libs is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953909" version="1" comment="python3-test is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953910" version="1" comment="python3-tkinter is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953911" version="1" comment="cups is &lt;2.3.3op2-31.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953912" version="1" comment="cups-client is &lt;2.3.3op2-31.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953913" version="1" comment="cups-devel is &lt;2.3.3op2-31.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953914" version="1" comment="cups-filesystem is &lt;2.3.3op2-31.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953915" version="1" comment="cups-ipptool is &lt;2.3.3op2-31.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953916" version="1" comment="cups-libs is &lt;2.3.3op2-31.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953917" version="1" comment="cups-lpd is &lt;2.3.3op2-31.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953918" version="1" comment="cups-printerapp is &lt;2.3.3op2-31.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953919" version="1" comment="grafana-pcp is &lt;5.1.1-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953920" version="1" comment="grafana is &lt;10.2.6-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953921" version="1" comment="grafana-selinux is &lt;10.2.6-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953922" version="1" comment="krb5-devel is &lt;1.21.1-4.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953923" version="1" comment="krb5-libs is &lt;1.21.1-4.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953924" version="1" comment="krb5-pkinit is &lt;1.21.1-4.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953925" version="1" comment="krb5-server is &lt;1.21.1-4.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953926" version="1" comment="krb5-server-ldap is &lt;1.21.1-4.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953927" version="1" comment="krb5-workstation is &lt;1.21.1-4.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953928" version="1" comment="libkadm5 is &lt;1.21.1-4.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953929" version="1" comment="expat is &lt;2.5.0-3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953930" version="1" comment="expat-devel is &lt;2.5.0-3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954005" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954006" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954007" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954008" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954009" version="1" comment="dotnet-host is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954010" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954011" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954012" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954013" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.100-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954014" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.100-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954015" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.100-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954016" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.100-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954017" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954018" version="1" comment="dotnet-templates-9.0 is &lt;9.0.100-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954019" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.100-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953931" version="1" comment="openexr is &lt;3.1.1-2.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953932" version="1" comment="openexr-devel is &lt;3.1.1-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953933" version="1" comment="openexr-libs is &lt;3.1.1-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953934" version="1" comment="thunderbird is &lt;128.4.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953935" version="1" comment="webkit2gtk3 is &lt;2.46.3-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953936" version="1" comment="webkit2gtk3-devel is &lt;2.46.3-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953937" version="1" comment="webkit2gtk3-jsc is &lt;2.46.3-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953938" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.3-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953939" version="1" comment="firefox is &lt;128.4.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953940" version="1" comment="firefox-x11 is &lt;128.4.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953941" version="1" comment="NetworkManager-libreswan is &lt;1.2.22-4.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953942" version="1" comment="NetworkManager-libreswan-gnome is &lt;1.2.22-4.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953943" version="1" comment="libsoup is &lt;2.72.0-8.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953944" version="1" comment="libsoup-devel is &lt;2.72.0-8.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953945" version="1" comment="bpftool is &lt;7.4.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953946" version="1" comment="kernel is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953947" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.14.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953948" version="1" comment="kernel-core is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953949" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953950" version="1" comment="kernel-debug is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953951" version="1" comment="kernel-debug-core is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953954" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953955" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953956" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953957" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953960" version="1" comment="kernel-doc is &lt;5.14.0-503.14.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953961" version="1" comment="kernel-headers is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953962" version="1" comment="kernel-modules is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953963" version="1" comment="kernel-modules-core is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953964" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953965" version="1" comment="kernel-tools is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953966" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953968" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953969" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953970" version="1" comment="libperf is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953971" version="1" comment="perf is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953972" version="1" comment="python3-perf is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953973" version="1" comment="rtla is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953974" version="1" comment="rv is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953975" version="1" comment="squid is &lt;5.5-14.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953976" version="1" comment="libvpx is &lt;1.9.0-8.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953977" version="1" comment="libvpx-devel is &lt;1.9.0-8.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959322" version="1" comment="bpftool is &lt;7.4.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959323" version="1" comment="kernel is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959324" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.21.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959325" version="1" comment="kernel-core is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959326" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959327" version="1" comment="kernel-debug is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959328" version="1" comment="kernel-debug-core is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959331" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959332" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959333" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959334" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959337" version="1" comment="kernel-doc is &lt;5.14.0-503.21.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959338" version="1" comment="kernel-headers is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959339" version="1" comment="kernel-modules is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959340" version="1" comment="kernel-modules-core is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959341" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959342" version="1" comment="kernel-tools is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959343" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959345" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959346" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959347" version="1" comment="libperf is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959348" version="1" comment="perf is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959349" version="1" comment="python3-perf is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959350" version="1" comment="rtla is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959351" version="1" comment="rv is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960005" version="1" comment="firefox is &lt;128.6.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960006" version="1" comment="firefox-x11 is &lt;128.6.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959720" version="1" comment="webkit2gtk3 is &lt;2.46.5-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959721" version="1" comment="webkit2gtk3-devel is &lt;2.46.5-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959722" version="1" comment="webkit2gtk3-jsc is &lt;2.46.5-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959723" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.5-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960007" version="1" comment="thunderbird is &lt;128.6.0-3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959724" version="1" comment="iperf3 is &lt;3.9-13.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959725" version="1" comment="dpdk is &lt;23.11-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959726" version="1" comment="dpdk-devel is &lt;23.11-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959727" version="1" comment="dpdk-doc is &lt;23.11-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959728" version="1" comment="dpdk-tools is &lt;23.11-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960124" version="1" comment="fence-agents-aliyun is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960125" version="1" comment="fence-agents-all is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960126" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960127" version="1" comment="fence-agents-apc is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960128" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960129" version="1" comment="fence-agents-aws is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960130" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960131" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960132" version="1" comment="fence-agents-brocade is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960133" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960134" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960135" version="1" comment="fence-agents-common is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960136" version="1" comment="fence-agents-compute is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960137" version="1" comment="fence-agents-drac5 is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960138" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960139" version="1" comment="fence-agents-emerson is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960140" version="1" comment="fence-agents-eps is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960141" version="1" comment="fence-agents-gce is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960142" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960143" version="1" comment="fence-agents-hpblade is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960144" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960145" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960146" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960147" version="1" comment="fence-agents-ifmib is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960148" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960149" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960150" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960151" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960152" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960153" version="1" comment="fence-agents-ipdu is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960154" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960155" version="1" comment="fence-agents-kdump is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960156" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960157" version="1" comment="fence-agents-mpath is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960158" version="1" comment="fence-agents-openstack is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960159" version="1" comment="fence-agents-redfish is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960160" version="1" comment="fence-agents-rhevm is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960161" version="1" comment="fence-agents-rsa is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960162" version="1" comment="fence-agents-rsb is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960163" version="1" comment="fence-agents-sbd is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960164" version="1" comment="fence-agents-scsi is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960165" version="1" comment="fence-agents-virsh is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960166" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960167" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960168" version="1" comment="fence-agents-wti is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960169" version="1" comment="fence-virt is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960170" version="1" comment="fence-virtd is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960171" version="1" comment="fence-virtd-cpg is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960172" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960173" version="1" comment="fence-virtd-multicast is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960174" version="1" comment="fence-virtd-serial is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960175" version="1" comment="fence-virtd-tcp is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960176" version="1" comment="ha-cloud-support is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960344" version="1" comment="raptor2 is &lt;2.0.15-32.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960345" version="1" comment="raptor2-devel is &lt;2.0.15-32.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960346" version="1" comment="rsync is &lt;3.2.3-20.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960347" version="1" comment="rsync-daemon is &lt;3.2.3-20.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961436" version="1" comment="ipa-client is &lt;4.12.2-1.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961437" version="1" comment="ipa-client-common is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961438" version="1" comment="ipa-client-epn is &lt;4.12.2-1.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961439" version="1" comment="ipa-client-samba is &lt;4.12.2-1.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961440" version="1" comment="ipa-common is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961441" version="1" comment="ipa-selinux is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961442" version="1" comment="ipa-selinux-luna is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961443" version="1" comment="ipa-selinux-nfast is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961444" version="1" comment="ipa-server is &lt;4.12.2-1.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961445" version="1" comment="ipa-server-common is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961446" version="1" comment="ipa-server-dns is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961447" version="1" comment="ipa-server-trust-ad is &lt;4.12.2-1.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961448" version="1" comment="python3-ipaclient is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961449" version="1" comment="python3-ipalib is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961450" version="1" comment="python3-ipaserver is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960791" version="1" comment="python3-ipatests is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960792" version="1" comment="NetworkManager is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960793" version="1" comment="NetworkManager-adsl is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960794" version="1" comment="NetworkManager-bluetooth is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960795" version="1" comment="NetworkManager-cloud-setup is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960796" version="1" comment="NetworkManager-config-connectivity-suse is &lt;1.48.10-5.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960797" version="1" comment="NetworkManager-config-server is &lt;1.48.10-5.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960798" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.48.10-5.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960799" version="1" comment="NetworkManager-initscripts-updown is &lt;1.48.10-5.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960800" version="1" comment="NetworkManager-libnm is &lt;1.48.10-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960801" version="1" comment="NetworkManager-libnm-devel is &lt;1.48.10-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960802" version="1" comment="NetworkManager-ovs is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960803" version="1" comment="NetworkManager-ppp is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960804" version="1" comment="NetworkManager-team is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960805" version="1" comment="NetworkManager-tui is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960806" version="1" comment="NetworkManager-wifi is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960807" version="1" comment="NetworkManager-wwan is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961355" version="1" comment="java-17-openjdk is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961356" version="1" comment="java-17-openjdk-demo is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961357" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961358" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961359" version="1" comment="java-17-openjdk-devel is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961360" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961361" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961362" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961363" version="1" comment="java-17-openjdk-headless is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961364" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961365" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961366" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961367" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961368" version="1" comment="java-17-openjdk-jmods is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961369" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961370" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961371" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961372" version="1" comment="java-17-openjdk-src is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961373" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961374" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961375" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961376" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961377" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961378" version="1" comment="java-21-openjdk is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961379" version="1" comment="java-21-openjdk-demo is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961380" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961381" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961382" version="1" comment="java-21-openjdk-devel is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961383" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961384" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961385" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961386" version="1" comment="java-21-openjdk-headless is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961387" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961388" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961389" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961390" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961391" version="1" comment="java-21-openjdk-jmods is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961392" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961393" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961394" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961395" version="1" comment="java-21-openjdk-src is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961396" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961397" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961398" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961399" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961400" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961451" version="1" comment="bpftool is &lt;7.4.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961452" version="1" comment="kernel is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961453" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.22.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961454" version="1" comment="kernel-core is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961455" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961456" version="1" comment="kernel-debug is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961457" version="1" comment="kernel-debug-core is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961460" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961461" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961462" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961463" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961466" version="1" comment="kernel-doc is &lt;5.14.0-503.22.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961467" version="1" comment="kernel-headers is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961468" version="1" comment="kernel-modules is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961469" version="1" comment="kernel-modules-core is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961470" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961471" version="1" comment="kernel-tools is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961472" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961474" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961475" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961476" version="1" comment="libperf is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961477" version="1" comment="perf is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961478" version="1" comment="python3-perf is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961479" version="1" comment="rtla is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961480" version="1" comment="rv is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961481" version="1" comment="python3-jinja2 is &lt;2.11.3-7.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961482" version="1" comment="git-lfs is &lt;3.4.1-4.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961483" version="1" comment="redis is &lt;7.2.7-1.module+el9.5.0+22705+3d861c1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961484" version="1" comment="redis-devel is &lt;7.2.7-1.module+el9.5.0+22705+3d861c1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961485" version="1" comment="redis-doc is &lt;7.2.7-1.module+el9.5.0+22705+3d861c1c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961486" version="1" comment="redis is &lt;6.2.17-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961487" version="1" comment="redis-devel is &lt;6.2.17-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961488" version="1" comment="redis-doc is &lt;6.2.17-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962061" version="1" comment="libsoup is &lt;2.72.0-8.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962062" version="1" comment="libsoup-devel is &lt;2.72.0-8.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962391" version="1" comment="galera is &lt;26.4.20-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962392" version="1" comment="mariadb is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962393" version="1" comment="mariadb-backup is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962394" version="1" comment="mariadb-common is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962395" version="1" comment="mariadb-devel is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962396" version="1" comment="mariadb-embedded is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962397" version="1" comment="mariadb-embedded-devel is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962398" version="1" comment="mariadb-errmsg is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962399" version="1" comment="mariadb-gssapi-server is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962400" version="1" comment="mariadb-oqgraph-engine is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962401" version="1" comment="mariadb-pam is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962402" version="1" comment="mariadb-server is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962403" version="1" comment="mariadb-server-galera is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962404" version="1" comment="mariadb-server-utils is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962405" version="1" comment="mariadb-test is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962406" version="1" comment="galera is &lt;26.4.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962407" version="1" comment="mariadb is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962408" version="1" comment="mariadb-backup is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962409" version="1" comment="mariadb-common is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962410" version="1" comment="mariadb-devel is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962411" version="1" comment="mariadb-embedded is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962412" version="1" comment="mariadb-embedded-devel is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962413" version="1" comment="mariadb-errmsg is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962414" version="1" comment="mariadb-gssapi-server is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962415" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962416" version="1" comment="mariadb-pam is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962417" version="1" comment="mariadb-server is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962418" version="1" comment="mariadb-server-galera is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962419" version="1" comment="mariadb-server-utils is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962420" version="1" comment="mariadb-test is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962421" version="1" comment="keepalived is &lt;2.2.8-4.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962422" version="1" comment="podman is &lt;5.2.2-13.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962423" version="1" comment="podman-docker is &lt;5.2.2-13.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962424" version="1" comment="podman-plugins is &lt;5.2.2-13.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962425" version="1" comment="podman-remote is &lt;5.2.2-13.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962426" version="1" comment="podman-tests is &lt;5.2.2-13.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962427" version="1" comment="buildah is &lt;1.37.6-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962428" version="1" comment="buildah-tests is &lt;1.37.6-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962429" version="1" comment="bzip2 is &lt;1.0.8-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962430" version="1" comment="bzip2-devel is &lt;1.0.8-10.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962431" version="1" comment="bzip2-libs is &lt;1.0.8-10.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962432" version="1" comment="mingw32-glib2 is &lt;2.78.6-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962433" version="1" comment="mingw32-glib2-static is &lt;2.78.6-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962434" version="1" comment="mingw64-glib2 is &lt;2.78.6-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962435" version="1" comment="mingw64-glib2-static is &lt;2.78.6-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998055" version="1" comment="firefox is &lt;128.12.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998056" version="1" comment="firefox-x11 is &lt;128.12.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998057" version="1" comment="python-unversioned-command is &lt;3.9.21-2.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998058" version="1" comment="python3 is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998059" version="1" comment="python3-debug is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998060" version="1" comment="python3-devel is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998061" version="1" comment="python3-idle is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998062" version="1" comment="python3-libs is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998063" version="1" comment="python3-test is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998064" version="1" comment="python3-tkinter is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998168" version="1" comment="python3.11 is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998169" version="1" comment="python3.11-debug is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998170" version="1" comment="python3.11-devel is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998171" version="1" comment="python3.11-idle is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998172" version="1" comment="python3.11-libs is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998173" version="1" comment="python3.11-test is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998174" version="1" comment="python3.11-tkinter is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998065" version="1" comment="python3.12 is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998066" version="1" comment="python3.12-debug is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998067" version="1" comment="python3.12-devel is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998068" version="1" comment="python3.12-idle is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998069" version="1" comment="python3.12-libs is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998070" version="1" comment="python3.12-test is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998071" version="1" comment="python3.12-tkinter is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998072" version="1" comment="thunderbird is &lt;128.12.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999182" version="1" comment="socat is &lt;1.7.4.1-6.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999183" version="1" comment="kernel is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999184" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.25.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999185" version="1" comment="kernel-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999186" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999187" version="1" comment="kernel-debug is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999188" version="1" comment="kernel-debug-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999191" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999192" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999193" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999194" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999197" version="1" comment="kernel-doc is &lt;5.14.0-570.25.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999198" version="1" comment="kernel-headers is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999199" version="1" comment="kernel-modules is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999200" version="1" comment="kernel-modules-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999201" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999202" version="1" comment="kernel-rt is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999203" version="1" comment="kernel-rt-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999204" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999205" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999207" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999208" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999209" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999210" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999212" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999213" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999214" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999215" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999216" version="1" comment="kernel-tools is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999217" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999219" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999220" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999221" version="1" comment="libperf is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999222" version="1" comment="perf is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999223" version="1" comment="python3-perf is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999224" version="1" comment="rtla is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999225" version="1" comment="rv is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999226" version="1" comment="python3-setuptools is &lt;53.0.0-13.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999227" version="1" comment="python3-setuptools-wheel is &lt;53.0.0-13.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999418" version="1" comment="podman is &lt;5.4.0-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999419" version="1" comment="podman-docker is &lt;5.4.0-12.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999420" version="1" comment="podman-plugins is &lt;5.4.0-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999421" version="1" comment="podman-remote is &lt;5.4.0-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999422" version="1" comment="podman-tests is &lt;5.4.0-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999228" version="1" comment="jq is &lt;1.6-17.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999229" version="1" comment="jq-devel is &lt;1.6-17.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999423" version="1" comment="gnome-remote-desktop is &lt;40.0-11.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963164" version="1" comment="firefox is &lt;128.7.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963165" version="1" comment="firefox-x11 is &lt;128.7.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999424" version="1" comment="go-toolset is &lt;1.24.4-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999425" version="1" comment="golang is &lt;1.24.4-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999426" version="1" comment="golang-bin is &lt;1.24.4-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999427" version="1" comment="golang-docs is &lt;1.24.4-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999428" version="1" comment="golang-misc is &lt;1.24.4-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999429" version="1" comment="golang-race is &lt;1.24.4-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999430" version="1" comment="golang-src is &lt;1.24.4-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999431" version="1" comment="golang-tests is &lt;1.24.4-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999607" version="1" comment="libxml2 is &lt;2.9.13-10.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999608" version="1" comment="libxml2-devel is &lt;2.9.13-10.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999609" version="1" comment="python3-libxml2 is &lt;2.9.13-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006289" version="1" comment="kernel is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006290" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.26.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006291" version="1" comment="kernel-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006292" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006293" version="1" comment="kernel-debug is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006294" version="1" comment="kernel-debug-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006297" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006298" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006299" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006300" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006303" version="1" comment="kernel-doc is &lt;5.14.0-570.26.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006304" version="1" comment="kernel-headers is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006305" version="1" comment="kernel-modules is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006306" version="1" comment="kernel-modules-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006307" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006308" version="1" comment="kernel-rt is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006309" version="1" comment="kernel-rt-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006310" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006311" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006313" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006314" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006315" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006316" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006318" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006319" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006320" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006321" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006322" version="1" comment="kernel-tools is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006323" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006325" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006326" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006327" version="1" comment="libperf is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006328" version="1" comment="perf is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006329" version="1" comment="python3-perf is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006330" version="1" comment="rtla is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006331" version="1" comment="rv is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006152" version="1" comment="cloud-init is &lt;24.4-4.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008294" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008295" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.462.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008296" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.462.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008297" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.462.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008298" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008299" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008300" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008301" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008302" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008303" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008304" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008305" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008306" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008307" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008308" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.462.b08-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008309" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.462.b08-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008310" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008311" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008312" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008313" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011414" version="1" comment="java-11-openjdk is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011166" version="1" comment="java-11-openjdk-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011415" version="1" comment="java-11-openjdk-demo is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011168" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011169" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011170" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011416" version="1" comment="java-11-openjdk-devel is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011172" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011173" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011174" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011175" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011417" version="1" comment="java-11-openjdk-headless is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011177" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011178" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011179" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011418" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011181" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011419" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011183" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011420" version="1" comment="java-11-openjdk-jmods is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011185" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011186" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011187" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011188" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011421" version="1" comment="java-11-openjdk-src is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011190" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011191" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011192" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011422" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011194" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011195" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011196" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007998" version="1" comment="java-17-openjdk is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007999" version="1" comment="java-17-openjdk-demo is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008000" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008001" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008002" version="1" comment="java-17-openjdk-devel is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008003" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008004" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008005" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008006" version="1" comment="java-17-openjdk-headless is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008007" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008008" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008009" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008010" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008011" version="1" comment="java-17-openjdk-jmods is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008012" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008013" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008014" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008015" version="1" comment="java-17-openjdk-src is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008016" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008017" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008018" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008019" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008020" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022816" version="1" comment="java-21-openjdk is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022817" version="1" comment="java-21-openjdk-demo is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022818" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022819" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022820" version="1" comment="java-21-openjdk-devel is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022821" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022822" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022823" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022824" version="1" comment="java-21-openjdk-headless is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022825" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022826" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022827" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022828" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022829" version="1" comment="java-21-openjdk-jmods is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022830" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022831" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022832" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022833" version="1" comment="java-21-openjdk-src is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022834" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022835" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022836" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022837" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022838" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007811" version="1" comment="glib2 is &lt;2.68.4-16.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007812" version="1" comment="glib2-devel is &lt;2.68.4-16.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007813" version="1" comment="glib2-doc is &lt;2.68.4-16.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007814" version="1" comment="glib2-static is &lt;2.68.4-16.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007815" version="1" comment="glib2-tests is &lt;2.68.4-16.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008048" version="1" comment="tomcat is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008049" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008050" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008051" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008052" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008053" version="1" comment="tomcat-lib is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008054" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008055" version="1" comment="tomcat-webapps is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008992" version="1" comment="avahi is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008993" version="1" comment="avahi-autoipd is &lt;0.8-22.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008994" version="1" comment="avahi-compat-howl is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008995" version="1" comment="avahi-compat-howl-devel is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008996" version="1" comment="avahi-compat-libdns_sd is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008997" version="1" comment="avahi-compat-libdns_sd-devel is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008998" version="1" comment="avahi-devel is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008999" version="1" comment="avahi-glib is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009000" version="1" comment="avahi-glib-devel is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009001" version="1" comment="avahi-gobject is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009002" version="1" comment="avahi-gobject-devel is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009003" version="1" comment="avahi-libs is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009004" version="1" comment="avahi-tools is &lt;0.8-22.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009005" version="1" comment="kernel is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009006" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.28.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009007" version="1" comment="kernel-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009008" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009009" version="1" comment="kernel-debug is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009010" version="1" comment="kernel-debug-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009013" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009014" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009015" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009016" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009019" version="1" comment="kernel-doc is &lt;5.14.0-570.28.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009020" version="1" comment="kernel-headers is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009021" version="1" comment="kernel-modules is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009022" version="1" comment="kernel-modules-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009023" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009024" version="1" comment="kernel-rt is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009025" version="1" comment="kernel-rt-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009026" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009027" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009029" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009030" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009031" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009032" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009034" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009035" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009036" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009037" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009038" version="1" comment="kernel-tools is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009039" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009041" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009042" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009043" version="1" comment="libperf is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009044" version="1" comment="perf is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009045" version="1" comment="python3-perf is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009046" version="1" comment="rtla is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009047" version="1" comment="rv is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009048" version="1" comment="redis is &lt;6.2.19-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009049" version="1" comment="redis-devel is &lt;6.2.19-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009050" version="1" comment="redis-doc is &lt;6.2.19-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009051" version="1" comment="git is &lt;2.47.3-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009052" version="1" comment="git-all is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009053" version="1" comment="git-core is &lt;2.47.3-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009054" version="1" comment="git-core-doc is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009055" version="1" comment="git-credential-libsecret is &lt;2.47.3-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009056" version="1" comment="git-daemon is &lt;2.47.3-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009057" version="1" comment="git-email is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009058" version="1" comment="git-gui is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009059" version="1" comment="git-instaweb is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009060" version="1" comment="git-subtree is &lt;2.47.3-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009061" version="1" comment="git-svn is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009062" version="1" comment="gitk is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009063" version="1" comment="gitweb is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009064" version="1" comment="perl-Git is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009065" version="1" comment="perl-Git-SVN is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009469" version="1" comment="fence-agents-aliyun is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009470" version="1" comment="fence-agents-all is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009471" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009472" version="1" comment="fence-agents-apc is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009473" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009474" version="1" comment="fence-agents-aws is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009475" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009476" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009477" version="1" comment="fence-agents-brocade is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009478" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009479" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009480" version="1" comment="fence-agents-common is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009481" version="1" comment="fence-agents-compute is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009482" version="1" comment="fence-agents-drac5 is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009483" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009484" version="1" comment="fence-agents-emerson is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009485" version="1" comment="fence-agents-eps is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009486" version="1" comment="fence-agents-gce is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009487" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009488" version="1" comment="fence-agents-hpblade is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009489" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009490" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009491" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009492" version="1" comment="fence-agents-ifmib is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009493" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009494" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009495" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009496" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009497" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009498" version="1" comment="fence-agents-ipdu is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009499" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009500" version="1" comment="fence-agents-kdump is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009501" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009502" version="1" comment="fence-agents-lpar is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009503" version="1" comment="fence-agents-mpath is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009504" version="1" comment="fence-agents-openstack is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009505" version="1" comment="fence-agents-redfish is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009506" version="1" comment="fence-agents-rhevm is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009507" version="1" comment="fence-agents-rsa is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009508" version="1" comment="fence-agents-rsb is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009509" version="1" comment="fence-agents-sbd is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009510" version="1" comment="fence-agents-scsi is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009511" version="1" comment="fence-agents-virsh is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009512" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009513" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009514" version="1" comment="fence-agents-wti is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009515" version="1" comment="fence-virt is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009516" version="1" comment="fence-virtd is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009517" version="1" comment="fence-virtd-cpg is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009518" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009519" version="1" comment="fence-virtd-multicast is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009520" version="1" comment="fence-virtd-serial is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009521" version="1" comment="fence-virtd-tcp is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009522" version="1" comment="ha-cloud-support is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010154" version="1" comment="firefox is &lt;128.13.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010155" version="1" comment="firefox-x11 is &lt;128.13.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011255" version="1" comment="nodejs is &lt;22.16.0-2.module+el9.6.0+23339+d3c8acfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011256" version="1" comment="nodejs-devel is &lt;22.16.0-2.module+el9.6.0+23339+d3c8acfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011257" version="1" comment="nodejs-docs is &lt;22.16.0-2.module+el9.6.0+23339+d3c8acfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011258" version="1" comment="nodejs-full-i18n is &lt;22.16.0-2.module+el9.6.0+23339+d3c8acfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011259" version="1" comment="nodejs-libs is &lt;22.16.0-2.module+el9.6.0+23339+d3c8acfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011260" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.6.0+23339+d3c8acfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011261" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.6.0+23339+d3c8acfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011262" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.6.0+23339+d3c8acfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011263" version="1" comment="npm is &lt;10.9.2-1.22.16.0.2.module+el9.6.0+23339+d3c8acfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011264" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.16.0.2.module+el9.6.0+23339+d3c8acfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011265" version="1" comment="perl is &lt;5.32.1-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011266" version="1" comment="perl-Attribute-Handlers is &lt;1.01-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011267" version="1" comment="perl-AutoLoader is &lt;5.74-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011268" version="1" comment="perl-AutoSplit is &lt;5.74-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011269" version="1" comment="perl-B is &lt;1.80-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011270" version="1" comment="perl-Benchmark is &lt;1.23-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011271" version="1" comment="perl-Class-Struct is &lt;0.66-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011272" version="1" comment="perl-Config-Extensions is &lt;0.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011273" version="1" comment="perl-DBM_Filter is &lt;0.06-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011274" version="1" comment="perl-Devel-Peek is &lt;1.28-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011275" version="1" comment="perl-Devel-SelfStubber is &lt;1.06-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011276" version="1" comment="perl-DirHandle is &lt;1.05-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011277" version="1" comment="perl-Dumpvalue is &lt;2.27-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011278" version="1" comment="perl-DynaLoader is &lt;1.47-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011279" version="1" comment="perl-English is &lt;1.11-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011280" version="1" comment="perl-Errno is &lt;1.30-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011281" version="1" comment="perl-ExtUtils-Constant is &lt;0.25-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011282" version="1" comment="perl-ExtUtils-Embed is &lt;1.35-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011283" version="1" comment="perl-ExtUtils-Miniperl is &lt;1.09-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011284" version="1" comment="perl-Fcntl is &lt;1.13-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011285" version="1" comment="perl-File-Basename is &lt;2.85-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011286" version="1" comment="perl-File-Compare is &lt;1.100.600-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011287" version="1" comment="perl-File-Copy is &lt;2.34-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011288" version="1" comment="perl-File-DosGlob is &lt;1.12-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011289" version="1" comment="perl-File-Find is &lt;1.37-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011290" version="1" comment="perl-File-stat is &lt;1.09-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011291" version="1" comment="perl-FileCache is &lt;1.10-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011292" version="1" comment="perl-FileHandle is &lt;2.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011293" version="1" comment="perl-FindBin is &lt;1.51-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011294" version="1" comment="perl-GDBM_File is &lt;1.18-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011295" version="1" comment="perl-Getopt-Std is &lt;1.12-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011296" version="1" comment="perl-Hash-Util is &lt;0.23-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011297" version="1" comment="perl-Hash-Util-FieldHash is &lt;1.20-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011298" version="1" comment="perl-I18N-Collate is &lt;1.02-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011299" version="1" comment="perl-I18N-LangTags is &lt;0.44-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011300" version="1" comment="perl-I18N-Langinfo is &lt;0.19-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011301" version="1" comment="perl-IO is &lt;1.43-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011302" version="1" comment="perl-IPC-Open3 is &lt;1.21-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011303" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011304" version="1" comment="perl-Math-Complex is &lt;1.59-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011305" version="1" comment="perl-Memoize is &lt;1.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011306" version="1" comment="perl-Module-Loaded is &lt;0.08-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011307" version="1" comment="perl-NDBM_File is &lt;1.15-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011308" version="1" comment="perl-NEXT is &lt;0.67-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011309" version="1" comment="perl-Net is &lt;1.02-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011310" version="1" comment="perl-ODBM_File is &lt;1.16-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011311" version="1" comment="perl-Opcode is &lt;1.48-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011312" version="1" comment="perl-POSIX is &lt;1.94-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011313" version="1" comment="perl-Pod-Functions is &lt;1.13-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011314" version="1" comment="perl-Pod-Html is &lt;1.25-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011315" version="1" comment="perl-Safe is &lt;2.41-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011316" version="1" comment="perl-Search-Dict is &lt;1.07-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011317" version="1" comment="perl-SelectSaver is &lt;1.02-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011318" version="1" comment="perl-SelfLoader is &lt;1.26-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011319" version="1" comment="perl-Symbol is &lt;1.08-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011320" version="1" comment="perl-Sys-Hostname is &lt;1.23-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011321" version="1" comment="perl-Term-Complete is &lt;1.403-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011322" version="1" comment="perl-Term-ReadLine is &lt;1.17-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011323" version="1" comment="perl-Test is &lt;1.31-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011324" version="1" comment="perl-Text-Abbrev is &lt;1.02-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011325" version="1" comment="perl-Thread is &lt;3.05-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011326" version="1" comment="perl-Thread-Semaphore is &lt;2.13-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011327" version="1" comment="perl-Tie is &lt;4.6-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011328" version="1" comment="perl-Tie-File is &lt;1.06-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011329" version="1" comment="perl-Tie-Memoize is &lt;1.1-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011330" version="1" comment="perl-Time is &lt;1.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011331" version="1" comment="perl-Time-Piece is &lt;1.3401-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011332" version="1" comment="perl-Unicode-UCD is &lt;0.75-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011333" version="1" comment="perl-User-pwent is &lt;1.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011334" version="1" comment="perl-autouse is &lt;1.11-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011335" version="1" comment="perl-base is &lt;2.27-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011336" version="1" comment="perl-blib is &lt;1.07-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011337" version="1" comment="perl-debugger is &lt;1.56-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011338" version="1" comment="perl-deprecate is &lt;0.04-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011339" version="1" comment="perl-devel is &lt;5.32.1-481.1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011340" version="1" comment="perl-diagnostics is &lt;1.37-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011341" version="1" comment="perl-doc is &lt;5.32.1-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011342" version="1" comment="perl-encoding-warnings is &lt;0.13-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011343" version="1" comment="perl-fields is &lt;2.27-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011344" version="1" comment="perl-filetest is &lt;1.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011345" version="1" comment="perl-if is &lt;0.60.800-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011346" version="1" comment="perl-interpreter is &lt;5.32.1-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011347" version="1" comment="perl-less is &lt;0.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011348" version="1" comment="perl-lib is &lt;0.65-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011349" version="1" comment="perl-libnetcfg is &lt;5.32.1-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011350" version="1" comment="perl-libs is &lt;5.32.1-481.1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011351" version="1" comment="perl-locale is &lt;1.09-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011352" version="1" comment="perl-macros is &lt;5.32.1-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011353" version="1" comment="perl-meta-notation is &lt;5.32.1-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011354" version="1" comment="perl-mro is &lt;1.23-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011355" version="1" comment="perl-open is &lt;1.12-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011356" version="1" comment="perl-overload is &lt;1.31-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011357" version="1" comment="perl-overloading is &lt;0.02-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011358" version="1" comment="perl-ph is &lt;5.32.1-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011359" version="1" comment="perl-sigtrap is &lt;1.09-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011360" version="1" comment="perl-sort is &lt;2.04-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011361" version="1" comment="perl-subs is &lt;1.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011362" version="1" comment="perl-utils is &lt;5.32.1-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011363" version="1" comment="perl-vars is &lt;1.05-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011364" version="1" comment="perl-vmsish is &lt;1.04-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963166" version="1" comment="thunderbird is &lt;128.7.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010539" version="1" comment="python3-unbound is &lt;1.16.2-19.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010540" version="1" comment="unbound is &lt;1.16.2-19.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010541" version="1" comment="unbound-devel is &lt;1.16.2-19.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010542" version="1" comment="unbound-dracut is &lt;1.16.2-19.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010543" version="1" comment="unbound-libs is &lt;1.16.2-19.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011365" version="1" comment="kernel is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011366" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.30.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011367" version="1" comment="kernel-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011368" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011369" version="1" comment="kernel-debug is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011370" version="1" comment="kernel-debug-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011373" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011374" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011375" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011376" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011379" version="1" comment="kernel-doc is &lt;5.14.0-570.30.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011380" version="1" comment="kernel-headers is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011381" version="1" comment="kernel-modules is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011382" version="1" comment="kernel-modules-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011383" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011384" version="1" comment="kernel-rt is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011385" version="1" comment="kernel-rt-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011386" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011387" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011389" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011390" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011391" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011392" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011394" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011395" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011396" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011397" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011398" version="1" comment="kernel-tools is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011399" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011401" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011402" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011403" version="1" comment="libperf is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011404" version="1" comment="perf is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011405" version="1" comment="python3-perf is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011406" version="1" comment="rtla is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011407" version="1" comment="rv is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011408" version="1" comment="sqlite is &lt;3.34.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011409" version="1" comment="sqlite-devel is &lt;3.34.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011410" version="1" comment="sqlite-libs is &lt;3.34.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011411" version="1" comment="redis is &lt;7.2.10-1.module+el9.6.0+23332+115a3b01 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011412" version="1" comment="redis-devel is &lt;7.2.10-1.module+el9.6.0+23332+115a3b01 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011413" version="1" comment="redis-doc is &lt;7.2.10-1.module+el9.6.0+23332+115a3b01 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011439" version="1" comment="icu is &lt;67.1-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011440" version="1" comment="libicu is &lt;67.1-10.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011441" version="1" comment="libicu-devel is &lt;67.1-10.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963298" version="1" comment="python3-tbb is &lt;2020.3-8.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963299" version="1" comment="tbb is &lt;2020.3-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963300" version="1" comment="tbb-devel is &lt;2020.3-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963301" version="1" comment="tbb-doc is &lt;2020.3-8.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011442" version="1" comment="libtpms is &lt;0.9.1-5.20211126git1ff6fe1f43.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011443" version="1" comment="thunderbird is &lt;128.13.0-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011535" version="1" comment="pki-jackson-annotations is &lt;2.19.1-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011536" version="1" comment="pki-jackson-core is &lt;2.19.1-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011537" version="1" comment="pki-jackson-databind is &lt;2.19.1-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011538" version="1" comment="pki-jackson-jaxrs-json-provider is &lt;2.19.1-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011539" version="1" comment="pki-jackson-jaxrs-providers is &lt;2.19.1-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011540" version="1" comment="pki-jackson-module-jaxb-annotations is &lt;2.19.1-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011646" version="1" comment="libxml2 is &lt;2.9.13-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011647" version="1" comment="libxml2-devel is &lt;2.9.13-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011648" version="1" comment="python3-libxml2 is &lt;2.9.13-11.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011990" version="1" comment="python3-requests is &lt;2.25.1-10.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011991" version="1" comment="python3-requests+security is &lt;2.25.1-10.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011992" version="1" comment="python3-requests+socks is &lt;2.25.1-10.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963302" version="1" comment="bpftool is &lt;7.4.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963303" version="1" comment="kernel is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963304" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.23.2.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963305" version="1" comment="kernel-core is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963306" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963307" version="1" comment="kernel-debug is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963308" version="1" comment="kernel-debug-core is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963311" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963312" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963313" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963314" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963317" version="1" comment="kernel-doc is &lt;5.14.0-503.23.2.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963318" version="1" comment="kernel-headers is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963319" version="1" comment="kernel-modules is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963320" version="1" comment="kernel-modules-core is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963321" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963322" version="1" comment="kernel-tools is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963323" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963325" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963326" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963327" version="1" comment="libperf is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963328" version="1" comment="perf is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963329" version="1" comment="python3-perf is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963330" version="1" comment="rtla is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963331" version="1" comment="rv is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012426" version="1" comment="kernel is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012427" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.32.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012428" version="1" comment="kernel-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012429" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012430" version="1" comment="kernel-debug is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012431" version="1" comment="kernel-debug-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012434" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012435" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012436" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012437" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012440" version="1" comment="kernel-doc is &lt;5.14.0-570.32.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012441" version="1" comment="kernel-headers is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012442" version="1" comment="kernel-modules is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012443" version="1" comment="kernel-modules-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012444" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012445" version="1" comment="kernel-rt is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012446" version="1" comment="kernel-rt-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012447" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012448" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012450" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012451" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012452" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012453" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012455" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012456" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012457" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012458" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012459" version="1" comment="kernel-tools is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012460" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012462" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012463" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012464" version="1" comment="libperf is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012465" version="1" comment="perf is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012466" version="1" comment="python3-perf is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012467" version="1" comment="rtla is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012468" version="1" comment="rv is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012469" version="1" comment="glibc is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012470" version="1" comment="glibc-all-langpacks is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012471" version="1" comment="glibc-benchtests is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012472" version="1" comment="glibc-common is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012473" version="1" comment="glibc-devel is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012474" version="1" comment="glibc-doc is &lt;2.34-168.el9_6.23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012475" version="1" comment="glibc-gconv-extra is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012476" version="1" comment="glibc-headers is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012477" version="1" comment="glibc-langpack-aa is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012478" version="1" comment="glibc-langpack-af is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012479" version="1" comment="glibc-langpack-agr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012480" version="1" comment="glibc-langpack-ak is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012481" version="1" comment="glibc-langpack-am is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012482" version="1" comment="glibc-langpack-an is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012483" version="1" comment="glibc-langpack-anp is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012484" version="1" comment="glibc-langpack-ar is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012485" version="1" comment="glibc-langpack-as is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012486" version="1" comment="glibc-langpack-ast is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012487" version="1" comment="glibc-langpack-ayc is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012488" version="1" comment="glibc-langpack-az is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012489" version="1" comment="glibc-langpack-be is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012490" version="1" comment="glibc-langpack-bem is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012491" version="1" comment="glibc-langpack-ber is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012492" version="1" comment="glibc-langpack-bg is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012493" version="1" comment="glibc-langpack-bhb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012494" version="1" comment="glibc-langpack-bho is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012495" version="1" comment="glibc-langpack-bi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012496" version="1" comment="glibc-langpack-bn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012497" version="1" comment="glibc-langpack-bo is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012498" version="1" comment="glibc-langpack-br is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012499" version="1" comment="glibc-langpack-brx is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012500" version="1" comment="glibc-langpack-bs is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012501" version="1" comment="glibc-langpack-byn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012502" version="1" comment="glibc-langpack-ca is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012503" version="1" comment="glibc-langpack-ce is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012504" version="1" comment="glibc-langpack-chr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012505" version="1" comment="glibc-langpack-ckb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012506" version="1" comment="glibc-langpack-cmn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012507" version="1" comment="glibc-langpack-crh is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012508" version="1" comment="glibc-langpack-cs is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012509" version="1" comment="glibc-langpack-csb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012510" version="1" comment="glibc-langpack-cv is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012511" version="1" comment="glibc-langpack-cy is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012512" version="1" comment="glibc-langpack-da is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012513" version="1" comment="glibc-langpack-de is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012514" version="1" comment="glibc-langpack-doi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012515" version="1" comment="glibc-langpack-dsb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012516" version="1" comment="glibc-langpack-dv is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012517" version="1" comment="glibc-langpack-dz is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012518" version="1" comment="glibc-langpack-el is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012519" version="1" comment="glibc-langpack-en is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012520" version="1" comment="glibc-langpack-eo is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012521" version="1" comment="glibc-langpack-es is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012522" version="1" comment="glibc-langpack-et is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012523" version="1" comment="glibc-langpack-eu is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012524" version="1" comment="glibc-langpack-fa is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012525" version="1" comment="glibc-langpack-ff is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012526" version="1" comment="glibc-langpack-fi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012527" version="1" comment="glibc-langpack-fil is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012528" version="1" comment="glibc-langpack-fo is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012529" version="1" comment="glibc-langpack-fr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012530" version="1" comment="glibc-langpack-fur is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012531" version="1" comment="glibc-langpack-fy is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012532" version="1" comment="glibc-langpack-ga is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012533" version="1" comment="glibc-langpack-gd is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012534" version="1" comment="glibc-langpack-gez is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012535" version="1" comment="glibc-langpack-gl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012536" version="1" comment="glibc-langpack-gu is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012537" version="1" comment="glibc-langpack-gv is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012538" version="1" comment="glibc-langpack-ha is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012539" version="1" comment="glibc-langpack-hak is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012540" version="1" comment="glibc-langpack-he is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012541" version="1" comment="glibc-langpack-hi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012542" version="1" comment="glibc-langpack-hif is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012543" version="1" comment="glibc-langpack-hne is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012544" version="1" comment="glibc-langpack-hr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012545" version="1" comment="glibc-langpack-hsb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012546" version="1" comment="glibc-langpack-ht is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012547" version="1" comment="glibc-langpack-hu is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012548" version="1" comment="glibc-langpack-hy is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012549" version="1" comment="glibc-langpack-ia is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012550" version="1" comment="glibc-langpack-id is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012551" version="1" comment="glibc-langpack-ig is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012552" version="1" comment="glibc-langpack-ik is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012553" version="1" comment="glibc-langpack-is is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012554" version="1" comment="glibc-langpack-it is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012555" version="1" comment="glibc-langpack-iu is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012556" version="1" comment="glibc-langpack-ja is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012557" version="1" comment="glibc-langpack-ka is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012558" version="1" comment="glibc-langpack-kab is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012559" version="1" comment="glibc-langpack-kk is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012560" version="1" comment="glibc-langpack-kl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012561" version="1" comment="glibc-langpack-km is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012562" version="1" comment="glibc-langpack-kn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012563" version="1" comment="glibc-langpack-ko is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012564" version="1" comment="glibc-langpack-kok is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012565" version="1" comment="glibc-langpack-ks is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012566" version="1" comment="glibc-langpack-ku is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012567" version="1" comment="glibc-langpack-kw is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012568" version="1" comment="glibc-langpack-ky is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012569" version="1" comment="glibc-langpack-lb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012570" version="1" comment="glibc-langpack-lg is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012571" version="1" comment="glibc-langpack-li is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012572" version="1" comment="glibc-langpack-lij is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012573" version="1" comment="glibc-langpack-ln is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012574" version="1" comment="glibc-langpack-lo is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012575" version="1" comment="glibc-langpack-lt is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012576" version="1" comment="glibc-langpack-lv is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012577" version="1" comment="glibc-langpack-lzh is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012578" version="1" comment="glibc-langpack-mag is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012579" version="1" comment="glibc-langpack-mai is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012580" version="1" comment="glibc-langpack-mfe is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012581" version="1" comment="glibc-langpack-mg is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012582" version="1" comment="glibc-langpack-mhr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012583" version="1" comment="glibc-langpack-mi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012584" version="1" comment="glibc-langpack-miq is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012585" version="1" comment="glibc-langpack-mjw is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012586" version="1" comment="glibc-langpack-mk is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012587" version="1" comment="glibc-langpack-ml is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012588" version="1" comment="glibc-langpack-mn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012589" version="1" comment="glibc-langpack-mni is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012590" version="1" comment="glibc-langpack-mnw is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012591" version="1" comment="glibc-langpack-mr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012592" version="1" comment="glibc-langpack-ms is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012593" version="1" comment="glibc-langpack-mt is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012594" version="1" comment="glibc-langpack-my is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012595" version="1" comment="glibc-langpack-nan is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012596" version="1" comment="glibc-langpack-nb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012597" version="1" comment="glibc-langpack-nds is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012598" version="1" comment="glibc-langpack-ne is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012599" version="1" comment="glibc-langpack-nhn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012600" version="1" comment="glibc-langpack-niu is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012601" version="1" comment="glibc-langpack-nl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012602" version="1" comment="glibc-langpack-nn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012603" version="1" comment="glibc-langpack-nr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012604" version="1" comment="glibc-langpack-nso is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012605" version="1" comment="glibc-langpack-oc is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012606" version="1" comment="glibc-langpack-om is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012607" version="1" comment="glibc-langpack-or is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012608" version="1" comment="glibc-langpack-os is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012609" version="1" comment="glibc-langpack-pa is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012610" version="1" comment="glibc-langpack-pap is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012611" version="1" comment="glibc-langpack-pl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012612" version="1" comment="glibc-langpack-ps is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012613" version="1" comment="glibc-langpack-pt is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012614" version="1" comment="glibc-langpack-quz is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012615" version="1" comment="glibc-langpack-raj is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012616" version="1" comment="glibc-langpack-ro is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012617" version="1" comment="glibc-langpack-ru is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012618" version="1" comment="glibc-langpack-rw is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012619" version="1" comment="glibc-langpack-sa is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012620" version="1" comment="glibc-langpack-sah is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012621" version="1" comment="glibc-langpack-sat is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012622" version="1" comment="glibc-langpack-sc is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012623" version="1" comment="glibc-langpack-sd is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012624" version="1" comment="glibc-langpack-se is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012625" version="1" comment="glibc-langpack-sgs is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012626" version="1" comment="glibc-langpack-shn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012627" version="1" comment="glibc-langpack-shs is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012628" version="1" comment="glibc-langpack-si is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012629" version="1" comment="glibc-langpack-sid is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012630" version="1" comment="glibc-langpack-sk is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012631" version="1" comment="glibc-langpack-sl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012632" version="1" comment="glibc-langpack-sm is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012633" version="1" comment="glibc-langpack-so is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012634" version="1" comment="glibc-langpack-sq is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012635" version="1" comment="glibc-langpack-sr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012636" version="1" comment="glibc-langpack-ss is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012637" version="1" comment="glibc-langpack-st is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012638" version="1" comment="glibc-langpack-sv is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012639" version="1" comment="glibc-langpack-sw is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012640" version="1" comment="glibc-langpack-szl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012641" version="1" comment="glibc-langpack-ta is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012642" version="1" comment="glibc-langpack-tcy is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012643" version="1" comment="glibc-langpack-te is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012644" version="1" comment="glibc-langpack-tg is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012645" version="1" comment="glibc-langpack-th is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012646" version="1" comment="glibc-langpack-the is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012647" version="1" comment="glibc-langpack-ti is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012648" version="1" comment="glibc-langpack-tig is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012649" version="1" comment="glibc-langpack-tk is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012650" version="1" comment="glibc-langpack-tl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012651" version="1" comment="glibc-langpack-tn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012652" version="1" comment="glibc-langpack-to is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012653" version="1" comment="glibc-langpack-tpi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012654" version="1" comment="glibc-langpack-tr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012655" version="1" comment="glibc-langpack-ts is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012656" version="1" comment="glibc-langpack-tt is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012657" version="1" comment="glibc-langpack-ug is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012658" version="1" comment="glibc-langpack-uk is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012659" version="1" comment="glibc-langpack-unm is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012660" version="1" comment="glibc-langpack-ur is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012661" version="1" comment="glibc-langpack-uz is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012662" version="1" comment="glibc-langpack-ve is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012663" version="1" comment="glibc-langpack-vi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012664" version="1" comment="glibc-langpack-wa is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012665" version="1" comment="glibc-langpack-wae is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012666" version="1" comment="glibc-langpack-wal is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012667" version="1" comment="glibc-langpack-wo is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012668" version="1" comment="glibc-langpack-xh is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012669" version="1" comment="glibc-langpack-yi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012670" version="1" comment="glibc-langpack-yo is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012671" version="1" comment="glibc-langpack-yue is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012672" version="1" comment="glibc-langpack-yuw is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012673" version="1" comment="glibc-langpack-zh is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012674" version="1" comment="glibc-langpack-zu is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012675" version="1" comment="glibc-locale-source is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012676" version="1" comment="glibc-minimal-langpack is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012677" version="1" comment="glibc-nss-devel is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012678" version="1" comment="glibc-static is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012679" version="1" comment="glibc-utils is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012680" version="1" comment="libnsl is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012681" version="1" comment="nscd is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012682" version="1" comment="nss_db is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012683" version="1" comment="nss_hesiod is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012684" version="1" comment="python3.12-setuptools is &lt;68.2.2-5.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012685" version="1" comment="python3.12-setuptools-wheel is &lt;68.2.2-5.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013272" version="1" comment="mod_security is &lt;2.9.6-2.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013273" version="1" comment="mod_security-mlogc is &lt;2.9.6-2.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013274" version="1" comment="gdk-pixbuf2 is &lt;2.42.6-6.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013275" version="1" comment="gdk-pixbuf2-devel is &lt;2.42.6-6.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013276" version="1" comment="gdk-pixbuf2-modules is &lt;2.42.6-6.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013277" version="1" comment="qt5-qt3d is &lt;5.15.9-2.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013278" version="1" comment="qt5-qt3d-devel is &lt;5.15.9-2.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013279" version="1" comment="qt5-qt3d-examples is &lt;5.15.9-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013280" version="1" comment="ncurses is &lt;6.2-10.20210508.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013281" version="1" comment="ncurses-base is &lt;6.2-10.20210508.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013282" version="1" comment="ncurses-c++-libs is &lt;6.2-10.20210508.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013283" version="1" comment="ncurses-devel is &lt;6.2-10.20210508.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013284" version="1" comment="ncurses-libs is &lt;6.2-10.20210508.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013285" version="1" comment="ncurses-term is &lt;6.2-10.20210508.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963733" version="1" comment="gcc-toolset-14-gcc is &lt;14.2.1-1.3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963734" version="1" comment="gcc-toolset-14-gcc-c++ is &lt;14.2.1-1.3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963735" version="1" comment="gcc-toolset-14-gcc-gfortran is &lt;14.2.1-1.3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963736" version="1" comment="gcc-toolset-14-gcc-plugin-annobin is &lt;14.2.1-1.3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963737" version="1" comment="gcc-toolset-14-gcc-plugin-devel is &lt;14.2.1-1.3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963738" version="1" comment="gcc-toolset-14-libasan-devel is &lt;14.2.1-1.3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963739" version="1" comment="gcc-toolset-14-libatomic-devel is &lt;14.2.1-1.3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963740" version="1" comment="gcc-toolset-14-libgccjit is &lt;14.2.1-1.3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963741" version="1" comment="gcc-toolset-14-libgccjit-devel is &lt;14.2.1-1.3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963742" version="1" comment="gcc-toolset-14-libitm-devel is &lt;14.2.1-1.3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963743" version="1" comment="gcc-toolset-14-liblsan-devel is &lt;14.2.1-1.3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963744" version="1" comment="gcc-toolset-14-libquadmath-devel is &lt;14.2.1-1.3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963745" version="1" comment="gcc-toolset-14-libstdc++-devel is &lt;14.2.1-1.3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963746" version="1" comment="gcc-toolset-14-libstdc++-docs is &lt;14.2.1-1.3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963747" version="1" comment="gcc-toolset-14-libtsan-devel is &lt;14.2.1-1.3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963748" version="1" comment="gcc-toolset-14-libubsan-devel is &lt;14.2.1-1.3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963749" version="1" comment="gcc-toolset-14-offload-nvptx is &lt;14.2.1-1.3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963750" version="1" comment="libasan8 is &lt;14.2.1-1.3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963751" version="1" comment="libtsan2 is &lt;14.2.1-1.3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963752" version="1" comment="gcc-toolset-13-gcc is &lt;13.3.1-2.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963753" version="1" comment="gcc-toolset-13-gcc-c++ is &lt;13.3.1-2.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963754" version="1" comment="gcc-toolset-13-gcc-gfortran is &lt;13.3.1-2.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963755" version="1" comment="gcc-toolset-13-gcc-plugin-annobin is &lt;13.3.1-2.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963756" version="1" comment="gcc-toolset-13-gcc-plugin-devel is &lt;13.3.1-2.2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963757" version="1" comment="gcc-toolset-13-libasan-devel is &lt;13.3.1-2.2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963758" version="1" comment="gcc-toolset-13-libatomic-devel is &lt;13.3.1-2.2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963759" version="1" comment="gcc-toolset-13-libgccjit is &lt;13.3.1-2.2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963760" version="1" comment="gcc-toolset-13-libgccjit-devel is &lt;13.3.1-2.2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963761" version="1" comment="gcc-toolset-13-libitm-devel is &lt;13.3.1-2.2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963762" version="1" comment="gcc-toolset-13-liblsan-devel is &lt;13.3.1-2.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963763" version="1" comment="gcc-toolset-13-libquadmath-devel is &lt;13.3.1-2.2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963764" version="1" comment="gcc-toolset-13-libstdc++-devel is &lt;13.3.1-2.2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963765" version="1" comment="gcc-toolset-13-libstdc++-docs is &lt;13.3.1-2.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963766" version="1" comment="gcc-toolset-13-libtsan-devel is &lt;13.3.1-2.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963767" version="1" comment="gcc-toolset-13-libubsan-devel is &lt;13.3.1-2.2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963768" version="1" comment="gcc-toolset-13-offload-nvptx is &lt;13.3.1-2.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963769" version="1" comment="libasan8 is &lt;13.3.1-2.2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963770" version="1" comment="libtsan2 is &lt;13.3.1-2.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963381" version="1" comment="doxygen is &lt;1.9.1-12.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963382" version="1" comment="doxygen-doxywizard is &lt;1.9.1-12.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963383" version="1" comment="doxygen-latex is &lt;1.9.1-12.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963384" version="1" comment="openssl is &lt;3.2.2-6.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963385" version="1" comment="openssl-devel is &lt;3.2.2-6.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963386" version="1" comment="openssl-libs is &lt;3.2.2-6.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963387" version="1" comment="openssl-perl is &lt;3.2.2-6.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013159" version="1" comment="libxml2 is &lt;2.9.13-12.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013160" version="1" comment="libxml2-devel is &lt;2.9.13-12.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013161" version="1" comment="python3-libxml2 is &lt;2.9.13-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963820" version="1" comment="cpp is &lt;11.5.0-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963821" version="1" comment="gcc is &lt;11.5.0-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963822" version="1" comment="gcc-c++ is &lt;11.5.0-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963823" version="1" comment="gcc-gfortran is &lt;11.5.0-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963824" version="1" comment="gcc-offload-nvptx is &lt;11.5.0-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963825" version="1" comment="gcc-plugin-annobin is &lt;11.5.0-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963826" version="1" comment="gcc-plugin-devel is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963827" version="1" comment="libasan is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963828" version="1" comment="libatomic is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963829" version="1" comment="libgcc is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963830" version="1" comment="libgccjit is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963831" version="1" comment="libgccjit-devel is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963832" version="1" comment="libgfortran is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963833" version="1" comment="libgomp is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963834" version="1" comment="libgomp-offload-nvptx is &lt;11.5.0-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963835" version="1" comment="libitm is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963836" version="1" comment="libitm-devel is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963837" version="1" comment="liblsan is &lt;11.5.0-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963838" version="1" comment="libquadmath is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963839" version="1" comment="libquadmath-devel is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963840" version="1" comment="libstdc++ is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963841" version="1" comment="libstdc++-devel is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963842" version="1" comment="libstdc++-docs is &lt;11.5.0-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963843" version="1" comment="libstdc++-static is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963844" version="1" comment="libtsan is &lt;11.5.0-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963845" version="1" comment="libubsan is &lt;11.5.0-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963771" version="1" comment="libxml2 is &lt;2.9.13-6.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963772" version="1" comment="libxml2-devel is &lt;2.9.13-6.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963773" version="1" comment="python3-libxml2 is &lt;2.9.13-6.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013286" version="1" comment="python3.11-setuptools is &lt;65.5.1-4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013287" version="1" comment="python3.11-setuptools-wheel is &lt;65.5.1-4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013382" version="1" comment="kernel is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013383" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.33.2.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013384" version="1" comment="kernel-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013385" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013386" version="1" comment="kernel-debug is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013387" version="1" comment="kernel-debug-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013390" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013391" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013392" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013393" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013396" version="1" comment="kernel-doc is &lt;5.14.0-570.33.2.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013397" version="1" comment="kernel-headers is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013398" version="1" comment="kernel-modules is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013399" version="1" comment="kernel-modules-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013400" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013401" version="1" comment="kernel-rt is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013402" version="1" comment="kernel-rt-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013403" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013404" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013406" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013407" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013408" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013409" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013411" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013412" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013413" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013414" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013415" version="1" comment="kernel-tools is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013416" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013418" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013419" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013420" version="1" comment="libperf is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013421" version="1" comment="perf is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013422" version="1" comment="python3-perf is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013423" version="1" comment="rtla is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013424" version="1" comment="rv is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013938" version="1" comment="webkit2gtk3 is &lt;2.48.5-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013939" version="1" comment="webkit2gtk3-devel is &lt;2.48.5-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013940" version="1" comment="webkit2gtk3-jsc is &lt;2.48.5-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013941" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.48.5-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015534" version="1" comment="go-toolset is &lt;1.24.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015535" version="1" comment="golang is &lt;1.24.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015536" version="1" comment="golang-bin is &lt;1.24.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015537" version="1" comment="golang-docs is &lt;1.24.6-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015538" version="1" comment="golang-misc is &lt;1.24.6-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015539" version="1" comment="golang-race is &lt;1.24.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015540" version="1" comment="golang-src is &lt;1.24.6-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015541" version="1" comment="golang-tests is &lt;1.24.6-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015542" version="1" comment="kernel is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015543" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.35.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015544" version="1" comment="kernel-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015545" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015546" version="1" comment="kernel-debug is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015547" version="1" comment="kernel-debug-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015550" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015551" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015552" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015553" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015556" version="1" comment="kernel-doc is &lt;5.14.0-570.35.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015557" version="1" comment="kernel-headers is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015558" version="1" comment="kernel-modules is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015559" version="1" comment="kernel-modules-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015560" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015561" version="1" comment="kernel-rt is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015562" version="1" comment="kernel-rt-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015563" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015564" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015566" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015567" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015568" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015569" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015571" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015572" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015573" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015574" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015575" version="1" comment="kernel-tools is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015576" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015578" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015579" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015580" version="1" comment="libperf is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015581" version="1" comment="perf is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015582" version="1" comment="python3-perf is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015583" version="1" comment="rtla is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015584" version="1" comment="rv is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015585" version="1" comment="xterm is &lt;366-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015586" version="1" comment="xterm-resize is &lt;366-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015587" version="1" comment="bsdtar is &lt;3.5.3-6.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015588" version="1" comment="libarchive is &lt;3.5.3-6.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015589" version="1" comment="libarchive-devel is &lt;3.5.3-6.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016325" version="1" comment="tomcat is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016326" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016327" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016328" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016329" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016330" version="1" comment="tomcat-lib is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016331" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016332" version="1" comment="tomcat-webapps is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016333" version="1" comment="firefox is &lt;128.14.0-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016334" version="1" comment="firefox-x11 is &lt;128.14.0-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015654" version="1" comment="kernel is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015655" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.37.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015656" version="1" comment="kernel-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015657" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015658" version="1" comment="kernel-debug is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015659" version="1" comment="kernel-debug-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015662" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015663" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015664" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015665" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015668" version="1" comment="kernel-doc is &lt;5.14.0-570.37.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015669" version="1" comment="kernel-headers is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015670" version="1" comment="kernel-modules is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015671" version="1" comment="kernel-modules-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015672" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015673" version="1" comment="kernel-rt is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015674" version="1" comment="kernel-rt-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015675" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015676" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015678" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015679" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015680" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015681" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015683" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015684" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015685" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015686" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015687" version="1" comment="kernel-tools is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015688" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015690" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015691" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015692" version="1" comment="libperf is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015693" version="1" comment="perf is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015694" version="1" comment="python3-perf is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015695" version="1" comment="rtla is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015696" version="1" comment="rv is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963846" version="1" comment="nodejs is &lt;20.18.2-1.module+el9.5.0+22758+4ad2c198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963847" version="1" comment="nodejs-devel is &lt;20.18.2-1.module+el9.5.0+22758+4ad2c198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963848" version="1" comment="nodejs-docs is &lt;20.18.2-1.module+el9.5.0+22758+4ad2c198 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963849" version="1" comment="nodejs-full-i18n is &lt;20.18.2-1.module+el9.5.0+22758+4ad2c198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963850" version="1" comment="npm is &lt;10.8.2-1.20.18.2.1.module+el9.5.0+22758+4ad2c198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963851" version="1" comment="nodejs is &lt;18.20.6-1.module+el9.5.0+22773+9a359385 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963852" version="1" comment="nodejs-devel is &lt;18.20.6-1.module+el9.5.0+22773+9a359385 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963853" version="1" comment="nodejs-docs is &lt;18.20.6-1.module+el9.5.0+22773+9a359385 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963854" version="1" comment="nodejs-full-i18n is &lt;18.20.6-1.module+el9.5.0+22773+9a359385 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963855" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.5.0+22773+9a359385 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963856" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.5.0+22773+9a359385 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963857" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.5.0+22773+9a359385 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963858" version="1" comment="npm is &lt;10.8.2-1.18.20.6.1.module+el9.5.0+22773+9a359385 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015590" version="1" comment="aide is &lt;0.16-103.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016097" version="1" comment="thunderbird is &lt;128.14.0-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016335" version="1" comment="pg_repack is &lt;1.5.1-1.module+el9.6.0+22880+6b241eec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016336" version="1" comment="pgvector is &lt;0.6.2-2.module+el9.6.0+22979+c3d78d52 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016337" version="1" comment="postgresql is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016338" version="1" comment="postgresql-contrib is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016339" version="1" comment="postgresql-docs is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016340" version="1" comment="postgresql-plperl is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016341" version="1" comment="postgresql-plpython3 is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016342" version="1" comment="postgresql-pltcl is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016343" version="1" comment="postgresql-private-devel is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016344" version="1" comment="postgresql-private-libs is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016345" version="1" comment="postgresql-server is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016346" version="1" comment="postgresql-server-devel is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016347" version="1" comment="postgresql-static is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016348" version="1" comment="postgresql-test is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016349" version="1" comment="postgresql-test-rpm-macros is &lt;16.10-1.module+el9.6.0+23420+848a4539 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016350" version="1" comment="postgresql-upgrade is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016351" version="1" comment="postgresql-upgrade-devel is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053988" version="1" comment="pg_repack is &lt;1.4.8-2.module+el9.5.0+22224+f5585c78 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053989" version="1" comment="postgresql is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053990" version="1" comment="postgresql-contrib is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053991" version="1" comment="postgresql-docs is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053992" version="1" comment="postgresql-plperl is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053993" version="1" comment="postgresql-plpython3 is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053994" version="1" comment="postgresql-pltcl is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053995" version="1" comment="postgresql-private-devel is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053996" version="1" comment="postgresql-private-libs is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053997" version="1" comment="postgresql-server is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053998" version="1" comment="postgresql-server-devel is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053999" version="1" comment="postgresql-static is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054000" version="1" comment="postgresql-test is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054001" version="1" comment="postgresql-test-rpm-macros is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054002" version="1" comment="postgresql-upgrade is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054003" version="1" comment="postgresql-upgrade-devel is &lt;15.14-1.module+el9.6.0+23419+7863ab62 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016352" version="1" comment="postgresql is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016353" version="1" comment="postgresql-contrib is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016354" version="1" comment="postgresql-docs is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016355" version="1" comment="postgresql-plperl is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016356" version="1" comment="postgresql-plpython3 is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016357" version="1" comment="postgresql-pltcl is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016358" version="1" comment="postgresql-private-devel is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016359" version="1" comment="postgresql-private-libs is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016360" version="1" comment="postgresql-server is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016361" version="1" comment="postgresql-server-devel is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016362" version="1" comment="postgresql-static is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016363" version="1" comment="postgresql-test is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016364" version="1" comment="postgresql-test-rpm-macros is &lt;13.22-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016365" version="1" comment="postgresql-upgrade is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016366" version="1" comment="postgresql-upgrade-devel is &lt;13.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016866" version="1" comment="mod_http2 is &lt;2.0.26-4.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017003" version="1" comment="python3.12 is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017004" version="1" comment="python3.12-debug is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017005" version="1" comment="python3.12-devel is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017006" version="1" comment="python3.12-idle is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017007" version="1" comment="python3.12-libs is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017008" version="1" comment="python3.12-test is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017009" version="1" comment="python3.12-tkinter is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017010" version="1" comment="python3.11 is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017011" version="1" comment="python3.11-debug is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017012" version="1" comment="python3.11-devel is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017013" version="1" comment="python3.11-idle is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017014" version="1" comment="python3.11-libs is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017015" version="1" comment="python3.11-test is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017016" version="1" comment="python3.11-tkinter is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017120" version="1" comment="kernel is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017121" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.39.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017122" version="1" comment="kernel-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017123" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017124" version="1" comment="kernel-debug is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017125" version="1" comment="kernel-debug-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017128" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017129" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017130" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017131" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017134" version="1" comment="kernel-doc is &lt;5.14.0-570.39.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017135" version="1" comment="kernel-headers is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017136" version="1" comment="kernel-modules is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017137" version="1" comment="kernel-modules-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017138" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017139" version="1" comment="kernel-rt is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017140" version="1" comment="kernel-rt-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017141" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017142" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017144" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017145" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017146" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017147" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017149" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017150" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017151" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017152" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017153" version="1" comment="kernel-tools is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017154" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017156" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017157" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017158" version="1" comment="libperf is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017159" version="1" comment="perf is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017160" version="1" comment="python3-perf is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017161" version="1" comment="rtla is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017162" version="1" comment="rv is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017017" version="1" comment="libudisks2 is &lt;2.9.4-11.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017018" version="1" comment="libudisks2-devel is &lt;2.9.4-11.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017019" version="1" comment="udisks2 is &lt;2.9.4-11.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017020" version="1" comment="udisks2-iscsi is &lt;2.9.4-11.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017021" version="1" comment="udisks2-lsm is &lt;2.9.4-11.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017022" version="1" comment="udisks2-lvm2 is &lt;2.9.4-11.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017023" version="1" comment="python-unversioned-command is &lt;3.9.21-2.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017024" version="1" comment="python3 is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017025" version="1" comment="python3-debug is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017026" version="1" comment="python3-devel is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017027" version="1" comment="python3-idle is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017028" version="1" comment="python3-libs is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017029" version="1" comment="python3-test is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017030" version="1" comment="python3-tkinter is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017031" version="1" comment="httpd is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017032" version="1" comment="httpd-core is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017033" version="1" comment="httpd-devel is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017034" version="1" comment="httpd-filesystem is &lt;2.4.62-4.el9_6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017035" version="1" comment="httpd-manual is &lt;2.4.62-4.el9_6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017036" version="1" comment="httpd-tools is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017037" version="1" comment="mod_ldap is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017038" version="1" comment="mod_lua is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017039" version="1" comment="mod_proxy_html is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017040" version="1" comment="mod_session is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017041" version="1" comment="mod_ssl is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016906" version="1" comment="pam is &lt;1.5.1-26.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016907" version="1" comment="pam-devel is &lt;1.5.1-26.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016908" version="1" comment="pam-docs is &lt;1.5.1-26.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017422" version="1" comment="kernel is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017423" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.41.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017424" version="1" comment="kernel-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017425" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017426" version="1" comment="kernel-debug is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017427" version="1" comment="kernel-debug-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017430" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017431" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017432" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017433" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017436" version="1" comment="kernel-doc is &lt;5.14.0-570.41.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017437" version="1" comment="kernel-headers is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017438" version="1" comment="kernel-modules is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017439" version="1" comment="kernel-modules-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017440" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017441" version="1" comment="kernel-rt is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017442" version="1" comment="kernel-rt-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017443" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017444" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017446" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017447" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017448" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017449" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017451" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017452" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017453" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017454" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017455" version="1" comment="kernel-tools is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017456" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017458" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017459" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017460" version="1" comment="libperf is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017461" version="1" comment="perf is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017462" version="1" comment="python3-perf is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017463" version="1" comment="rtla is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017464" version="1" comment="rv is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017700" version="1" comment="python3.12-cryptography is &lt;41.0.7-2.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017875" version="1" comment="kernel is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017876" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.42.2.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017877" version="1" comment="kernel-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017878" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017879" version="1" comment="kernel-debug is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017880" version="1" comment="kernel-debug-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017883" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017884" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017885" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017886" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017889" version="1" comment="kernel-doc is &lt;5.14.0-570.42.2.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017890" version="1" comment="kernel-headers is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017891" version="1" comment="kernel-modules is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017892" version="1" comment="kernel-modules-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017893" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017894" version="1" comment="kernel-rt is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017895" version="1" comment="kernel-rt-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017896" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017897" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017899" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017900" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017901" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017902" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017904" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017905" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017906" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017907" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017908" version="1" comment="kernel-tools is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017909" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017911" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017912" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017913" version="1" comment="libperf is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017914" version="1" comment="perf is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017915" version="1" comment="python3-perf is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017916" version="1" comment="rtla is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017917" version="1" comment="rv is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018057" version="1" comment="cups is &lt;2.3.3op2-33.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018058" version="1" comment="cups-client is &lt;2.3.3op2-33.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018059" version="1" comment="cups-devel is &lt;2.3.3op2-33.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018060" version="1" comment="cups-filesystem is &lt;2.3.3op2-33.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018061" version="1" comment="cups-ipptool is &lt;2.3.3op2-33.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018062" version="1" comment="cups-libs is &lt;2.3.3op2-33.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018063" version="1" comment="cups-lpd is &lt;2.3.3op2-33.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018064" version="1" comment="cups-printerapp is &lt;2.3.3op2-33.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018240" version="1" comment="kernel is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018241" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.44.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018242" version="1" comment="kernel-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018243" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018244" version="1" comment="kernel-debug is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018245" version="1" comment="kernel-debug-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018248" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018249" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018250" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018251" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018254" version="1" comment="kernel-doc is &lt;5.14.0-570.44.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018255" version="1" comment="kernel-headers is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018256" version="1" comment="kernel-modules is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018257" version="1" comment="kernel-modules-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018258" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018259" version="1" comment="kernel-rt is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018260" version="1" comment="kernel-rt-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018261" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018262" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018264" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018265" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018266" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018267" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018269" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018270" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018271" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018272" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018273" version="1" comment="kernel-tools is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018274" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018276" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018277" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018278" version="1" comment="libperf is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018279" version="1" comment="perf is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018280" version="1" comment="python3-perf is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018281" version="1" comment="rtla is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018282" version="1" comment="rv is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018283" version="1" comment="python3-cryptography is &lt;36.0.1-5.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018321" version="1" comment="podman is &lt;5.4.0-13.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018322" version="1" comment="podman-docker is &lt;5.4.0-13.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018323" version="1" comment="podman-plugins is &lt;5.4.0-13.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018324" version="1" comment="podman-remote is &lt;5.4.0-13.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018325" version="1" comment="podman-tests is &lt;5.4.0-13.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018739" version="1" comment="mecab is &lt;0.996-3.module+el9.6.0+22713+cbf15e23.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018740" version="1" comment="mecab-devel is &lt;0.996-3.module+el9.6.0+22713+cbf15e23.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018741" version="1" comment="mecab-ipadic is &lt;2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018742" version="1" comment="mecab-ipadic-EUCJP is &lt;2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018743" version="1" comment="mysql is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018744" version="1" comment="mysql-common is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018745" version="1" comment="mysql-devel is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018746" version="1" comment="mysql-errmsg is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018747" version="1" comment="mysql-libs is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018748" version="1" comment="mysql-server is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018749" version="1" comment="mysql-test is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018750" version="1" comment="mysql-test-data is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018751" version="1" comment="rapidjson-devel is &lt;1.1.0-19.module+el9.6.0+22713+cbf15e23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018752" version="1" comment="rapidjson-doc is &lt;1.1.0-19.module+el9.6.0+22713+cbf15e23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018655" version="1" comment="mysql is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018656" version="1" comment="mysql-common is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018657" version="1" comment="mysql-devel is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018658" version="1" comment="mysql-errmsg is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018659" version="1" comment="mysql-libs is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018660" version="1" comment="mysql-server is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018661" version="1" comment="mysql-test is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018753" version="1" comment="firefox is &lt;140.3.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018754" version="1" comment="firefox-x11 is &lt;140.3.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018662" version="1" comment="gnutls is &lt;3.8.3-6.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018663" version="1" comment="gnutls-c++ is &lt;3.8.3-6.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018664" version="1" comment="gnutls-dane is &lt;3.8.3-6.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018665" version="1" comment="gnutls-devel is &lt;3.8.3-6.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018666" version="1" comment="gnutls-utils is &lt;3.8.3-6.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964799" version="1" comment="nodejs is &lt;22.13.1-1.module+el9.5.0+22763+17233acb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964800" version="1" comment="nodejs-devel is &lt;22.13.1-1.module+el9.5.0+22763+17233acb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964801" version="1" comment="nodejs-docs is &lt;22.13.1-1.module+el9.5.0+22763+17233acb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964802" version="1" comment="nodejs-full-i18n is &lt;22.13.1-1.module+el9.5.0+22763+17233acb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964803" version="1" comment="nodejs-libs is &lt;22.13.1-1.module+el9.5.0+22763+17233acb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964804" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.5.0+22763+17233acb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964805" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.5.0+22763+17233acb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964806" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.5.0+22763+17233acb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964807" version="1" comment="npm is &lt;10.9.2-1.22.13.1.1.module+el9.5.0+22763+17233acb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964808" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.13.1.1.module+el9.5.0+22763+17233acb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018755" version="1" comment="thunderbird is &lt;140.3.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019488" version="1" comment="kernel is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019489" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.46.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019490" version="1" comment="kernel-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019491" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019492" version="1" comment="kernel-debug is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019493" version="1" comment="kernel-debug-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019496" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019497" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019498" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019499" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019502" version="1" comment="kernel-doc is &lt;5.14.0-570.46.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019503" version="1" comment="kernel-headers is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019504" version="1" comment="kernel-modules is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019505" version="1" comment="kernel-modules-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019506" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019507" version="1" comment="kernel-rt is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019508" version="1" comment="kernel-rt-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019509" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019510" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019512" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019513" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019514" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019515" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019517" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019518" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019519" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019520" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019521" version="1" comment="kernel-tools is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019522" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019524" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019525" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019526" version="1" comment="libperf is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019527" version="1" comment="perf is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019528" version="1" comment="python3-perf is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019529" version="1" comment="rtla is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019530" version="1" comment="rv is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965064" version="1" comment="bpftool is &lt;7.4.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965065" version="1" comment="kernel is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965066" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.26.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965067" version="1" comment="kernel-core is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965068" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965069" version="1" comment="kernel-debug is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965070" version="1" comment="kernel-debug-core is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965073" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965074" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965075" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965076" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965079" version="1" comment="kernel-doc is &lt;5.14.0-503.26.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965080" version="1" comment="kernel-headers is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965081" version="1" comment="kernel-modules is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965082" version="1" comment="kernel-modules-core is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965083" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965084" version="1" comment="kernel-tools is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965085" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965087" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965088" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965089" version="1" comment="libperf is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965090" version="1" comment="perf is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965091" version="1" comment="python3-perf is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965092" version="1" comment="rtla is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965093" version="1" comment="rv is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965094" version="1" comment="mysql is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965095" version="1" comment="mysql-common is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965096" version="1" comment="mysql-devel is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965097" version="1" comment="mysql-errmsg is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965098" version="1" comment="mysql-libs is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965099" version="1" comment="mysql-server is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965100" version="1" comment="mysql-test is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965101" version="1" comment="bind is &lt;9.16.23-24.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965102" version="1" comment="bind-chroot is &lt;9.16.23-24.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965103" version="1" comment="bind-devel is &lt;9.16.23-24.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965104" version="1" comment="bind-dnssec-doc is &lt;9.16.23-24.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965105" version="1" comment="bind-dnssec-utils is &lt;9.16.23-24.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965106" version="1" comment="bind-doc is &lt;9.16.23-24.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965107" version="1" comment="bind-libs is &lt;9.16.23-24.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965108" version="1" comment="bind-license is &lt;9.16.23-24.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965109" version="1" comment="bind-utils is &lt;9.16.23-24.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965110" version="1" comment="python3-bind is &lt;9.16.23-24.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019798" version="1" comment="kernel is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019799" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.49.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019800" version="1" comment="kernel-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019801" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019802" version="1" comment="kernel-debug is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019803" version="1" comment="kernel-debug-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019806" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019807" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019808" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019809" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019812" version="1" comment="kernel-doc is &lt;5.14.0-570.49.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019813" version="1" comment="kernel-headers is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019814" version="1" comment="kernel-modules is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019815" version="1" comment="kernel-modules-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019816" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019817" version="1" comment="kernel-rt is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019818" version="1" comment="kernel-rt-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019819" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019820" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019822" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019823" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019824" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019825" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019827" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019828" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019829" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019830" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019831" version="1" comment="kernel-tools is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019832" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019834" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019835" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019836" version="1" comment="libperf is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019837" version="1" comment="perf is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019838" version="1" comment="python3-perf is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019839" version="1" comment="rtla is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019840" version="1" comment="rv is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020050" version="1" comment="ipa-client is &lt;4.12.2-14.el9_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020051" version="1" comment="ipa-client-common is &lt;4.12.2-14.el9_6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020052" version="1" comment="ipa-client-encrypted-dns is &lt;4.12.2-14.el9_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020053" version="1" comment="ipa-client-epn is &lt;4.12.2-14.el9_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020054" version="1" comment="ipa-client-samba is &lt;4.12.2-14.el9_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020055" version="1" comment="ipa-common is &lt;4.12.2-14.el9_6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020056" version="1" comment="ipa-selinux is &lt;4.12.2-14.el9_6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020057" version="1" comment="ipa-selinux-luna is &lt;4.12.2-14.el9_6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020058" version="1" comment="ipa-selinux-nfast is &lt;4.12.2-14.el9_6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020059" version="1" comment="ipa-server is &lt;4.12.2-14.el9_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020060" version="1" comment="ipa-server-common is &lt;4.12.2-14.el9_6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020061" version="1" comment="ipa-server-dns is &lt;4.12.2-14.el9_6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020062" version="1" comment="ipa-server-encrypted-dns is &lt;4.12.2-14.el9_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020063" version="1" comment="ipa-server-trust-ad is &lt;4.12.2-14.el9_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020064" version="1" comment="python3-ipaclient is &lt;4.12.2-14.el9_6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020065" version="1" comment="python3-ipalib is &lt;4.12.2-14.el9_6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020066" version="1" comment="python3-ipaserver is &lt;4.12.2-14.el9_6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020067" version="1" comment="python3-ipatests is &lt;4.12.2-14.el9_6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021392" version="1" comment="perl-JSON-XS is &lt;4.04-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020388" version="1" comment="kernel is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020389" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.51.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020390" version="1" comment="kernel-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020391" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020392" version="1" comment="kernel-debug is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020393" version="1" comment="kernel-debug-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020396" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020397" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020398" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020399" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020402" version="1" comment="kernel-doc is &lt;5.14.0-570.51.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020403" version="1" comment="kernel-headers is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020404" version="1" comment="kernel-modules is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020405" version="1" comment="kernel-modules-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020406" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020407" version="1" comment="kernel-rt is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020408" version="1" comment="kernel-rt-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020409" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020410" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020412" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020413" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020414" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020415" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020417" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020418" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020419" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020420" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020421" version="1" comment="kernel-tools is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020422" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020424" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020425" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020426" version="1" comment="libperf is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020427" version="1" comment="perf is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020428" version="1" comment="python3-perf is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020429" version="1" comment="rtla is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020430" version="1" comment="rv is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965294" version="1" comment="libpq is &lt;13.20-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965295" version="1" comment="libpq-devel is &lt;13.20-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965296" version="1" comment="postgresql is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965297" version="1" comment="postgresql-contrib is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965298" version="1" comment="postgresql-docs is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965299" version="1" comment="postgresql-plperl is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965300" version="1" comment="postgresql-plpython3 is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965301" version="1" comment="postgresql-pltcl is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965302" version="1" comment="postgresql-private-devel is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965303" version="1" comment="postgresql-private-libs is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965304" version="1" comment="postgresql-server is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965305" version="1" comment="postgresql-server-devel is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965306" version="1" comment="postgresql-static is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965307" version="1" comment="postgresql-test is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965308" version="1" comment="postgresql-test-rpm-macros is &lt;13.20-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965309" version="1" comment="postgresql-upgrade is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965310" version="1" comment="postgresql-upgrade-devel is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020560" version="1" comment="open-vm-tools is &lt;12.5.0-1.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020561" version="1" comment="open-vm-tools-desktop is &lt;12.5.0-1.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020562" version="1" comment="open-vm-tools-salt-minion is &lt;12.5.0-1.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020563" version="1" comment="open-vm-tools-sdmp is &lt;12.5.0-1.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020564" version="1" comment="open-vm-tools-test is &lt;12.5.0-1.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020431" version="1" comment="iputils is &lt;20210202-11.el9_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020432" version="1" comment="iputils-ninfod is &lt;20210202-11.el9_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020779" version="1" comment="vim-X11 is &lt;8.2.2637-22.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020780" version="1" comment="vim-common is &lt;8.2.2637-22.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020781" version="1" comment="vim-enhanced is &lt;8.2.2637-22.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020782" version="1" comment="vim-filesystem is &lt;8.2.2637-22.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020783" version="1" comment="vim-minimal is &lt;8.2.2637-22.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021393" version="1" comment="kernel is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021394" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.52.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021395" version="1" comment="kernel-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021396" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021397" version="1" comment="kernel-debug is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021398" version="1" comment="kernel-debug-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021401" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021402" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021403" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021404" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021407" version="1" comment="kernel-doc is &lt;5.14.0-570.52.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021408" version="1" comment="kernel-headers is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021409" version="1" comment="kernel-modules is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021410" version="1" comment="kernel-modules-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021411" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021412" version="1" comment="kernel-rt is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021413" version="1" comment="kernel-rt-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021414" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021415" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021417" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021418" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021419" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021420" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021422" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021423" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021424" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021425" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021426" version="1" comment="kernel-tools is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021427" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021429" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021430" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021431" version="1" comment="libperf is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021432" version="1" comment="perf is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021433" version="1" comment="python3-perf is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021434" version="1" comment="rtla is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021435" version="1" comment="rv is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022618" version="1" comment="webkit2gtk3 is &lt;2.50.1-0.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022619" version="1" comment="webkit2gtk3-devel is &lt;2.50.1-0.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022620" version="1" comment="webkit2gtk3-jsc is &lt;2.50.1-0.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022621" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.50.1-0.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021803" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021804" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021805" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021806" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021807" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021808" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021809" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021810" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.121-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021811" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.121-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021812" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.121-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021813" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021814" version="1" comment="dotnet-templates-8.0 is &lt;8.0.121-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021815" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021816" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021817" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021818" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021819" version="1" comment="dotnet-host is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021820" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021821" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021822" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021823" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.111-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021824" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.111-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021825" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.111-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021826" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.111-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021827" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021828" version="1" comment="dotnet-templates-9.0 is &lt;9.0.111-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021829" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.111-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021830" version="1" comment="firefox is &lt;140.4.0-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021831" version="1" comment="firefox-x11 is &lt;140.4.0-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022061" version="1" comment="libssh is &lt;0.10.4-15.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022062" version="1" comment="libssh-config is &lt;0.10.4-15.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022063" version="1" comment="libssh-devel is &lt;0.10.4-15.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023062" version="1" comment="kernel is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023063" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.55.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023064" version="1" comment="kernel-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023065" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023066" version="1" comment="kernel-debug is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023067" version="1" comment="kernel-debug-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023070" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023071" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023072" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023073" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023076" version="1" comment="kernel-doc is &lt;5.14.0-570.55.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023077" version="1" comment="kernel-headers is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023078" version="1" comment="kernel-modules is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023079" version="1" comment="kernel-modules-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023080" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023081" version="1" comment="kernel-rt is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023082" version="1" comment="kernel-rt-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023083" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023084" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023086" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023087" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023088" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023089" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023091" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023092" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023093" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023094" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023095" version="1" comment="kernel-tools is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023096" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023098" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023099" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023100" version="1" comment="libperf is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023101" version="1" comment="perf is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023102" version="1" comment="python3-perf is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023103" version="1" comment="rtla is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023104" version="1" comment="rv is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022848" version="1" comment="thunderbird is &lt;140.4.0-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023351" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023352" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.472.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023353" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.472.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023354" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.472.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023355" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023356" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023357" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023358" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023359" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023360" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023361" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023362" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023363" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023364" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023365" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.472.b08-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023366" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.472.b08-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023367" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023368" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023369" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023370" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025669" version="1" comment="java-11-openjdk is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025494" version="1" comment="java-11-openjdk-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025670" version="1" comment="java-11-openjdk-demo is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025496" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025497" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025498" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025671" version="1" comment="java-11-openjdk-devel is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025500" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025501" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025502" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025503" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025672" version="1" comment="java-11-openjdk-headless is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025505" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025506" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025507" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025673" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025509" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025674" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025511" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025675" version="1" comment="java-11-openjdk-jmods is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025513" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025514" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025515" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025516" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025676" version="1" comment="java-11-openjdk-src is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025518" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025519" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025520" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025677" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025522" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025523" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025524" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023371" version="1" comment="java-17-openjdk is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023372" version="1" comment="java-17-openjdk-demo is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023373" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023374" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023375" version="1" comment="java-17-openjdk-devel is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023376" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023377" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023378" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023379" version="1" comment="java-17-openjdk-headless is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023380" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023381" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023382" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023383" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023384" version="1" comment="java-17-openjdk-jmods is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023385" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023386" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023387" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023388" version="1" comment="java-17-openjdk-src is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023389" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023390" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023391" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023392" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023393" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023394" version="1" comment="java-21-openjdk is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023395" version="1" comment="java-21-openjdk-demo is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023396" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023397" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023398" version="1" comment="java-21-openjdk-devel is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023399" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023400" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023401" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023402" version="1" comment="java-21-openjdk-headless is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023403" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023404" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023405" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023406" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023407" version="1" comment="java-21-openjdk-jmods is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023408" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023409" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023410" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023411" version="1" comment="java-21-openjdk-src is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023412" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023413" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023414" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023415" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023416" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024258" version="1" comment="kernel is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024259" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.58.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024260" version="1" comment="kernel-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024261" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024262" version="1" comment="kernel-debug is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024263" version="1" comment="kernel-debug-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024266" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024267" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024268" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024269" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024272" version="1" comment="kernel-doc is &lt;5.14.0-570.58.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024273" version="1" comment="kernel-headers is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024274" version="1" comment="kernel-modules is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024275" version="1" comment="kernel-modules-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024276" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024277" version="1" comment="kernel-rt is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024278" version="1" comment="kernel-rt-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024279" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024280" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024282" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024283" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024284" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024285" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024287" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024288" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024289" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024290" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024291" version="1" comment="kernel-tools is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024292" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024294" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024295" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024296" version="1" comment="libperf is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024297" version="1" comment="perf is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024298" version="1" comment="python3-perf is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024299" version="1" comment="rtla is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024300" version="1" comment="rv is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023929" version="1" comment="libtiff is &lt;4.4.0-13.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023930" version="1" comment="libtiff-devel is &lt;4.4.0-13.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023931" version="1" comment="libtiff-tools is &lt;4.4.0-13.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967154" version="1" comment="emacs is &lt;27.2-11.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967155" version="1" comment="emacs-common is &lt;27.2-11.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967156" version="1" comment="emacs-filesystem is &lt;27.2-11.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967157" version="1" comment="emacs-lucid is &lt;27.2-11.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967158" version="1" comment="emacs-nox is &lt;27.2-11.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024455" version="1" comment="redis is &lt;6.2.20-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024456" version="1" comment="redis-devel is &lt;6.2.20-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024457" version="1" comment="redis-doc is &lt;6.2.20-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024458" version="1" comment="redis is &lt;7.2.11-1.module+el9.6.0+23552+a3d3d132 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024459" version="1" comment="redis-devel is &lt;7.2.11-1.module+el9.6.0+23552+a3d3d132 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024460" version="1" comment="redis-doc is &lt;7.2.11-1.module+el9.6.0+23552+a3d3d132 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024764" version="1" comment="kernel is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024765" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.60.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024766" version="1" comment="kernel-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024767" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024768" version="1" comment="kernel-debug is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024769" version="1" comment="kernel-debug-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024772" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024773" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024774" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024775" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024778" version="1" comment="kernel-doc is &lt;5.14.0-570.60.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024779" version="1" comment="kernel-headers is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024780" version="1" comment="kernel-modules is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024781" version="1" comment="kernel-modules-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024782" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024783" version="1" comment="kernel-rt is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024784" version="1" comment="kernel-rt-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024785" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024786" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024788" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024789" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024790" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024791" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024793" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024794" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024795" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024796" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024797" version="1" comment="kernel-tools is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024798" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024800" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024801" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024802" version="1" comment="libperf is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024803" version="1" comment="perf is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024804" version="1" comment="python3-perf is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024805" version="1" comment="rtla is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024806" version="1" comment="rv is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024807" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-32.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024808" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-32.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024809" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-32.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024810" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-32.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024811" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-32.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024812" version="1" comment="xorg-x11-server-common is &lt;1.20.11-32.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024813" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-32.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024814" version="1" comment="xorg-x11-server-source is &lt;1.20.11-32.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024815" version="1" comment="tigervnc is &lt;1.14.1-9.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024816" version="1" comment="tigervnc-icons is &lt;1.14.1-9.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024817" version="1" comment="tigervnc-license is &lt;1.14.1-9.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024818" version="1" comment="tigervnc-selinux is &lt;1.14.1-9.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024819" version="1" comment="tigervnc-server is &lt;1.14.1-9.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024820" version="1" comment="tigervnc-server-minimal is &lt;1.14.1-9.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024821" version="1" comment="tigervnc-server-module is &lt;1.14.1-9.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024822" version="1" comment="pcs is &lt;0.11.9-2.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024823" version="1" comment="pcs-snmp is &lt;0.11.9-2.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024824" version="1" comment="galera is &lt;26.4.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024825" version="1" comment="mariadb is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024826" version="1" comment="mariadb-backup is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024827" version="1" comment="mariadb-common is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024828" version="1" comment="mariadb-devel is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024829" version="1" comment="mariadb-embedded is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024830" version="1" comment="mariadb-embedded-devel is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024831" version="1" comment="mariadb-errmsg is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024832" version="1" comment="mariadb-gssapi-server is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024833" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024834" version="1" comment="mariadb-pam is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024835" version="1" comment="mariadb-server is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024836" version="1" comment="mariadb-server-galera is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024837" version="1" comment="mariadb-server-utils is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024838" version="1" comment="mariadb-test is &lt;10.5.29-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024839" version="1" comment="xorg-x11-server-Xwayland is &lt;23.2.7-5.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024840" version="1" comment="xorg-x11-server-Xwayland-devel is &lt;23.2.7-5.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024841" version="1" comment="libsoup is &lt;2.72.0-10.el9_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024842" version="1" comment="libsoup-devel is &lt;2.72.0-10.el9_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025602" version="1" comment="qt5-qt3d is &lt;5.15.9-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025603" version="1" comment="qt5-qt3d-devel is &lt;5.15.9-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025604" version="1" comment="qt5-qt3d-examples is &lt;5.15.9-2.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025605" version="1" comment="runc is &lt;1.2.5-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025606" version="1" comment="kernel is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025607" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.62.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025608" version="1" comment="kernel-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025609" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025610" version="1" comment="kernel-debug is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025611" version="1" comment="kernel-debug-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025614" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025615" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025616" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025617" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025620" version="1" comment="kernel-doc is &lt;5.14.0-570.62.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025621" version="1" comment="kernel-headers is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025622" version="1" comment="kernel-modules is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025623" version="1" comment="kernel-modules-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025624" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025625" version="1" comment="kernel-rt is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025626" version="1" comment="kernel-rt-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025627" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025628" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025630" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025631" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025632" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025633" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025635" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025636" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025637" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025638" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025639" version="1" comment="kernel-tools is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025640" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025642" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025643" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025644" version="1" comment="libperf is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025645" version="1" comment="perf is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025646" version="1" comment="python3-perf is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025647" version="1" comment="rtla is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025648" version="1" comment="rv is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025649" version="1" comment="bind9.18 is &lt;9.18.29-4.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025650" version="1" comment="bind9.18-chroot is &lt;9.18.29-4.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025651" version="1" comment="bind9.18-devel is &lt;9.18.29-4.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025652" version="1" comment="bind9.18-dnssec-utils is &lt;9.18.29-4.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025653" version="1" comment="bind9.18-doc is &lt;9.18.29-4.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025654" version="1" comment="bind9.18-libs is &lt;9.18.29-4.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025655" version="1" comment="bind9.18-utils is &lt;9.18.29-4.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025656" version="1" comment="bind is &lt;9.16.23-31.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025657" version="1" comment="bind-chroot is &lt;9.16.23-31.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025658" version="1" comment="bind-devel is &lt;9.16.23-31.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025659" version="1" comment="bind-dnssec-doc is &lt;9.16.23-31.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025660" version="1" comment="bind-dnssec-utils is &lt;9.16.23-31.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025661" version="1" comment="bind-doc is &lt;9.16.23-31.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025662" version="1" comment="bind-libs is &lt;9.16.23-31.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025663" version="1" comment="bind-license is &lt;9.16.23-31.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025664" version="1" comment="bind-utils is &lt;9.16.23-31.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025665" version="1" comment="python3-bind is &lt;9.16.23-31.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967159" version="1" comment="webkit2gtk3 is &lt;2.46.6-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967160" version="1" comment="webkit2gtk3-devel is &lt;2.46.6-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967161" version="1" comment="webkit2gtk3-jsc is &lt;2.46.6-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967162" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.6-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054004" version="1" comment="kernel is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054005" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.5.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054006" version="1" comment="kernel-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054007" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054008" version="1" comment="kernel-debug is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054009" version="1" comment="kernel-debug-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054010" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054011" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054012" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054013" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054014" version="1" comment="kernel-doc is &lt;5.14.0-611.5.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054015" version="1" comment="kernel-headers is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054016" version="1" comment="kernel-modules is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054017" version="1" comment="kernel-modules-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054018" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054019" version="1" comment="kernel-rt is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054020" version="1" comment="kernel-rt-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054021" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054022" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054023" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054024" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054025" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054026" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054027" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054028" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054029" version="1" comment="kernel-tools is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054030" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054031" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054032" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054033" version="1" comment="libperf is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054034" version="1" comment="perf is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054035" version="1" comment="python3-perf is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054036" version="1" comment="rtla is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054037" version="1" comment="rv is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054038" version="1" comment="grub2-common is &lt;2.06-114.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054039" version="1" comment="grub2-efi-x64 is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054040" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054041" version="1" comment="grub2-efi-x64-modules is &lt;2.06-114.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054042" version="1" comment="grub2-pc is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054043" version="1" comment="grub2-pc-modules is &lt;2.06-114.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054044" version="1" comment="grub2-tools is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054045" version="1" comment="grub2-tools-efi is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054046" version="1" comment="grub2-tools-extra is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054047" version="1" comment="grub2-tools-minimal is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054048" version="1" comment="shadow-utils is &lt;4.9-15.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054049" version="1" comment="shadow-utils-subid is &lt;4.9-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054050" version="1" comment="shadow-utils-subid-devel is &lt;4.9-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025666" version="1" comment="zziplib is &lt;0.13.71-12.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025667" version="1" comment="zziplib-devel is &lt;0.13.71-12.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025668" version="1" comment="zziplib-utils is &lt;0.13.71-12.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054051" version="1" comment="podman is &lt;5.6.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054052" version="1" comment="podman-docker is &lt;5.6.0-6.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054053" version="1" comment="podman-plugins is &lt;5.6.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054054" version="1" comment="podman-remote is &lt;5.6.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054055" version="1" comment="podman-tests is &lt;5.6.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054056" version="1" comment="webkit2gtk3 is &lt;2.50.1-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054057" version="1" comment="webkit2gtk3-devel is &lt;2.50.1-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054058" version="1" comment="webkit2gtk3-jsc is &lt;2.50.1-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054059" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.50.1-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054060" version="1" comment="redis is &lt;6.2.20-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054061" version="1" comment="redis-devel is &lt;6.2.20-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054062" version="1" comment="redis-doc is &lt;6.2.20-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054063" version="1" comment="ipa-client is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054064" version="1" comment="ipa-client-common is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054065" version="1" comment="ipa-client-encrypted-dns is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054066" version="1" comment="ipa-client-epn is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054067" version="1" comment="ipa-client-samba is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054068" version="1" comment="ipa-common is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054069" version="1" comment="ipa-selinux is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054070" version="1" comment="ipa-selinux-luna is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054071" version="1" comment="ipa-selinux-nfast is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054072" version="1" comment="ipa-server is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054073" version="1" comment="ipa-server-common is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054074" version="1" comment="ipa-server-dns is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054075" version="1" comment="ipa-server-encrypted-dns is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054076" version="1" comment="ipa-server-trust-ad is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054077" version="1" comment="python3-ipaclient is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054078" version="1" comment="python3-ipalib is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054079" version="1" comment="python3-ipaserver is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054080" version="1" comment="python3-ipatests is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054081" version="1" comment="squid is &lt;5.5-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054082" version="1" comment="sqlite is &lt;3.34.1-9.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054083" version="1" comment="sqlite-devel is &lt;3.34.1-9.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054084" version="1" comment="sqlite-libs is &lt;3.34.1-9.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054085" version="1" comment="libssh is &lt;0.10.4-15.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054086" version="1" comment="libssh-config is &lt;0.10.4-15.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054087" version="1" comment="libssh-devel is &lt;0.10.4-15.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054088" version="1" comment="vim-X11 is &lt;8.2.2637-23.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054089" version="1" comment="vim-common is &lt;8.2.2637-23.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054090" version="1" comment="vim-enhanced is &lt;8.2.2637-23.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054091" version="1" comment="vim-filesystem is &lt;8.2.2637-23.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054092" version="1" comment="vim-minimal is &lt;8.2.2637-23.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054093" version="1" comment="libipa_hbac is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054094" version="1" comment="libsss_autofs is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054095" version="1" comment="libsss_certmap is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054096" version="1" comment="libsss_idmap is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054097" version="1" comment="libsss_nss_idmap is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054098" version="1" comment="libsss_nss_idmap-devel is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054099" version="1" comment="libsss_simpleifp is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054100" version="1" comment="libsss_sudo is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054101" version="1" comment="python3-libipa_hbac is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054102" version="1" comment="python3-libsss_nss_idmap is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054103" version="1" comment="python3-sss is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054104" version="1" comment="python3-sss-murmur is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054105" version="1" comment="python3-sssdconfig is &lt;2.9.7-4.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054106" version="1" comment="sssd is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054107" version="1" comment="sssd-ad is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054108" version="1" comment="sssd-client is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054109" version="1" comment="sssd-common is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054110" version="1" comment="sssd-common-pac is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054111" version="1" comment="sssd-dbus is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054112" version="1" comment="sssd-idp is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054113" version="1" comment="sssd-ipa is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054114" version="1" comment="sssd-kcm is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054115" version="1" comment="sssd-krb5 is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054116" version="1" comment="sssd-krb5-common is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054117" version="1" comment="sssd-ldap is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054118" version="1" comment="sssd-nfs-idmap is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054119" version="1" comment="sssd-passkey is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054120" version="1" comment="sssd-polkit-rules is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054121" version="1" comment="sssd-proxy is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054122" version="1" comment="sssd-tools is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054123" version="1" comment="sssd-winbind-idmap is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054124" version="1" comment="redis is &lt;7.2.11-1.module+el9.7.0+23559+d075163a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054125" version="1" comment="redis-devel is &lt;7.2.11-1.module+el9.7.0+23559+d075163a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054126" version="1" comment="redis-doc is &lt;7.2.11-1.module+el9.7.0+23559+d075163a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054127" version="1" comment="libtiff is &lt;4.4.0-15.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054128" version="1" comment="libtiff-devel is &lt;4.4.0-15.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054129" version="1" comment="libtiff-tools is &lt;4.4.0-15.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054130" version="1" comment="runc is &lt;1.3.0-4.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054131" version="1" comment="tigervnc is &lt;1.15.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054132" version="1" comment="tigervnc-icons is &lt;1.15.0-6.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054133" version="1" comment="tigervnc-license is &lt;1.15.0-6.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054134" version="1" comment="tigervnc-selinux is &lt;1.15.0-6.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054135" version="1" comment="tigervnc-server is &lt;1.15.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054136" version="1" comment="tigervnc-server-minimal is &lt;1.15.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054137" version="1" comment="tigervnc-server-module is &lt;1.15.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054138" version="1" comment="libsoup is &lt;2.72.0-12.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054139" version="1" comment="libsoup-devel is &lt;2.72.0-12.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054140" version="1" comment="xorg-x11-server-Xwayland is &lt;23.2.7-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054141" version="1" comment="xorg-x11-server-Xwayland-devel is &lt;23.2.7-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054142" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-32.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054143" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-32.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054144" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-32.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054145" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-32.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054146" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-32.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054147" version="1" comment="xorg-x11-server-common is &lt;1.20.11-32.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054148" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-32.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054149" version="1" comment="xorg-x11-server-source is &lt;1.20.11-32.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054150" version="1" comment="pcs is &lt;0.11.10-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054151" version="1" comment="pcs-snmp is &lt;0.11.10-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054152" version="1" comment="qt5-qt3d is &lt;5.15.9-2.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054153" version="1" comment="qt5-qt3d-devel is &lt;5.15.9-2.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054154" version="1" comment="qt5-qt3d-examples is &lt;5.15.9-2.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054155" version="1" comment="bind is &lt;9.16.23-34.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054156" version="1" comment="bind-chroot is &lt;9.16.23-34.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054157" version="1" comment="bind-devel is &lt;9.16.23-34.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054158" version="1" comment="bind-dnssec-doc is &lt;9.16.23-34.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054159" version="1" comment="bind-dnssec-utils is &lt;9.16.23-34.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054160" version="1" comment="bind-doc is &lt;9.16.23-34.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054161" version="1" comment="bind-libs is &lt;9.16.23-34.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054162" version="1" comment="bind-license is &lt;9.16.23-34.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054163" version="1" comment="bind-utils is &lt;9.16.23-34.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054164" version="1" comment="python3-bind is &lt;9.16.23-34.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054165" version="1" comment="bind9.18 is &lt;9.18.29-5.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054166" version="1" comment="bind9.18-chroot is &lt;9.18.29-5.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054167" version="1" comment="bind9.18-devel is &lt;9.18.29-5.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054168" version="1" comment="bind9.18-dnssec-utils is &lt;9.18.29-5.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054169" version="1" comment="bind9.18-doc is &lt;9.18.29-5.el9_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054170" version="1" comment="bind9.18-libs is &lt;9.18.29-5.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054171" version="1" comment="bind9.18-utils is &lt;9.18.29-5.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054172" version="1" comment="python3-kdcproxy is &lt;1.0.0-9.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054173" version="1" comment="openssl is &lt;3.5.1-4.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054174" version="1" comment="openssl-devel is &lt;3.5.1-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054175" version="1" comment="openssl-libs is &lt;3.5.1-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054176" version="1" comment="openssl-perl is &lt;3.5.1-4.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054177" version="1" comment="firefox is &lt;140.5.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054178" version="1" comment="firefox-x11 is &lt;140.5.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054179" version="1" comment="lasso is &lt;2.7.0-11.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054180" version="1" comment="lasso-devel is &lt;2.7.0-11.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054181" version="1" comment="python3-lasso is &lt;2.7.0-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054182" version="1" comment="kernel is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054183" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.8.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054184" version="1" comment="kernel-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054185" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054186" version="1" comment="kernel-debug is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054187" version="1" comment="kernel-debug-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054188" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054189" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054190" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054191" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054192" version="1" comment="kernel-doc is &lt;5.14.0-611.8.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054193" version="1" comment="kernel-headers is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054194" version="1" comment="kernel-modules is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054195" version="1" comment="kernel-modules-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054196" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054197" version="1" comment="kernel-rt is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054198" version="1" comment="kernel-rt-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054199" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054200" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054201" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054202" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054203" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054204" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054205" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054206" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054207" version="1" comment="kernel-tools is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054208" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054209" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054210" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054211" version="1" comment="libperf is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054212" version="1" comment="perf is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054213" version="1" comment="python3-perf is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054214" version="1" comment="rtla is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054215" version="1" comment="rv is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054216" version="1" comment="haproxy is &lt;2.8.14-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054217" version="1" comment="podman is &lt;5.6.0-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054218" version="1" comment="podman-docker is &lt;5.6.0-7.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054219" version="1" comment="podman-plugins is &lt;5.6.0-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054220" version="1" comment="podman-remote is &lt;5.6.0-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054221" version="1" comment="podman-tests is &lt;5.6.0-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054222" version="1" comment="delve is &lt;1.25.2-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054223" version="1" comment="go-toolset is &lt;1.25.3-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054224" version="1" comment="golang is &lt;1.25.3-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054225" version="1" comment="golang-bin is &lt;1.25.3-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054226" version="1" comment="golang-docs is &lt;1.25.3-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054227" version="1" comment="golang-misc is &lt;1.25.3-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054228" version="1" comment="golang-race is &lt;1.25.3-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054229" version="1" comment="golang-src is &lt;1.25.3-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054230" version="1" comment="golang-tests is &lt;1.25.3-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054231" version="1" comment="thunderbird is &lt;140.5.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054232" version="1" comment="valkey is &lt;8.0.6-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054233" version="1" comment="valkey-devel is &lt;8.0.6-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054234" version="1" comment="kernel is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054235" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.9.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054236" version="1" comment="kernel-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054237" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054238" version="1" comment="kernel-debug is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054239" version="1" comment="kernel-debug-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054240" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054241" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054242" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054243" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054244" version="1" comment="kernel-doc is &lt;5.14.0-611.9.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054245" version="1" comment="kernel-headers is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054246" version="1" comment="kernel-modules is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054247" version="1" comment="kernel-modules-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054248" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054249" version="1" comment="kernel-rt is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054250" version="1" comment="kernel-rt-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054251" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054252" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054253" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054254" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054255" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054256" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054257" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054258" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054259" version="1" comment="kernel-tools is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054260" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054261" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054262" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054263" version="1" comment="libperf is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054264" version="1" comment="perf is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054265" version="1" comment="python3-perf is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054266" version="1" comment="rtla is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054267" version="1" comment="rv is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054268" version="1" comment="gimp is &lt;3.0.4-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054269" version="1" comment="gimp-libs is &lt;3.0.4-1.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054270" version="1" comment="go-filesystem is &lt;3.6.0-12.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054271" version="1" comment="go-rpm-macros is &lt;3.6.0-12.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054272" version="1" comment="go-rpm-templates is &lt;3.6.0-12.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054273" version="1" comment="go-srpm-macros is &lt;3.6.0-12.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054274" version="1" comment="buildah is &lt;1.41.6-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054275" version="1" comment="buildah-tests is &lt;1.41.6-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054276" version="1" comment="expat is &lt;2.5.0-5.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054277" version="1" comment="expat-devel is &lt;2.5.0-5.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054278" version="1" comment="libxml2 is &lt;2.9.13-14.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054279" version="1" comment="libxml2-devel is &lt;2.9.13-14.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054280" version="1" comment="python3-libxml2 is &lt;2.9.13-14.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054281" version="1" comment="kernel is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054282" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.11.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054283" version="1" comment="kernel-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054284" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054285" version="1" comment="kernel-debug is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054286" version="1" comment="kernel-debug-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054287" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054288" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054289" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054290" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054291" version="1" comment="kernel-doc is &lt;5.14.0-611.11.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054292" version="1" comment="kernel-headers is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054293" version="1" comment="kernel-modules is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054294" version="1" comment="kernel-modules-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054295" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054296" version="1" comment="kernel-rt is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054297" version="1" comment="kernel-rt-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054298" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054299" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054300" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054301" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054302" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054303" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054304" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054305" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054306" version="1" comment="kernel-tools is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054307" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054308" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054309" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054310" version="1" comment="libperf is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054311" version="1" comment="perf is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054312" version="1" comment="python3-perf is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054313" version="1" comment="rtla is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054314" version="1" comment="rv is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054315" version="1" comment="rhel-net-naming-sysattrs is &lt;252-55.el9_7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054316" version="1" comment="systemd is &lt;252-55.el9_7.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054317" version="1" comment="systemd-boot-unsigned is &lt;252-55.el9_7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054318" version="1" comment="systemd-container is &lt;252-55.el9_7.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054319" version="1" comment="systemd-devel is &lt;252-55.el9_7.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054320" version="1" comment="systemd-journal-remote is &lt;252-55.el9_7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054321" version="1" comment="systemd-libs is &lt;252-55.el9_7.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054322" version="1" comment="systemd-oomd is &lt;252-55.el9_7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054323" version="1" comment="systemd-pam is &lt;252-55.el9_7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054324" version="1" comment="systemd-resolved is &lt;252-55.el9_7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054325" version="1" comment="systemd-rpm-macros is &lt;252-55.el9_7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054326" version="1" comment="systemd-udev is &lt;252-55.el9_7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054327" version="1" comment="systemd-ukify is &lt;252-55.el9_7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054328" version="1" comment="webkit2gtk3 is &lt;2.50.3-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054329" version="1" comment="webkit2gtk3-devel is &lt;2.50.3-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054330" version="1" comment="webkit2gtk3-jsc is &lt;2.50.3-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054331" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.50.3-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054332" version="1" comment="kernel is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054333" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.13.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054334" version="1" comment="kernel-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054335" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054336" version="1" comment="kernel-debug is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054337" version="1" comment="kernel-debug-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054338" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054339" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054340" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054341" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054342" version="1" comment="kernel-doc is &lt;5.14.0-611.13.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054343" version="1" comment="kernel-headers is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054344" version="1" comment="kernel-modules is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054345" version="1" comment="kernel-modules-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054346" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054347" version="1" comment="kernel-rt is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054348" version="1" comment="kernel-rt-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054349" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054350" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054351" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054352" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054353" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054354" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054355" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054356" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054357" version="1" comment="kernel-tools is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054358" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054359" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054360" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054361" version="1" comment="libperf is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054362" version="1" comment="perf is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054363" version="1" comment="python3-perf is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054364" version="1" comment="rtla is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054365" version="1" comment="rv is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054366" version="1" comment="firefox is &lt;140.6.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054367" version="1" comment="firefox-x11 is &lt;140.6.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054368" version="1" comment="tomcat is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054369" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054370" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054371" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054372" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054373" version="1" comment="tomcat-lib is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054374" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054375" version="1" comment="tomcat-webapps is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054376" version="1" comment="ruby is &lt;3.3.10-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054377" version="1" comment="ruby-bundled-gems is &lt;3.3.10-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054378" version="1" comment="ruby-default-gems is &lt;3.3.10-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054379" version="1" comment="ruby-devel is &lt;3.3.10-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054380" version="1" comment="ruby-doc is &lt;3.3.10-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054381" version="1" comment="ruby-libs is &lt;3.3.10-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054382" version="1" comment="rubygem-bigdecimal is &lt;3.1.5-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054383" version="1" comment="rubygem-bundler is &lt;2.5.22-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054384" version="1" comment="rubygem-io-console is &lt;0.7.1-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054385" version="1" comment="rubygem-irb is &lt;1.13.1-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054386" version="1" comment="rubygem-json is &lt;2.7.2-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054387" version="1" comment="rubygem-minitest is &lt;5.20.0-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054388" version="1" comment="rubygem-mysql2 is &lt;0.5.5-3.module+el9.7.0+23362+7018fe7e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054389" version="1" comment="rubygem-mysql2-doc is &lt;0.5.5-3.module+el9.7.0+23362+7018fe7e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054390" version="1" comment="rubygem-power_assert is &lt;2.0.3-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054391" version="1" comment="rubygem-psych is &lt;5.1.2-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054392" version="1" comment="rubygem-racc is &lt;1.7.3-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054393" version="1" comment="rubygem-rake is &lt;13.1.0-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054394" version="1" comment="rubygem-rbs is &lt;3.4.0-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054395" version="1" comment="rubygem-rdoc is &lt;6.6.3.1-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054396" version="1" comment="rubygem-rexml is &lt;3.4.4-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054397" version="1" comment="rubygem-rss is &lt;0.3.1-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054398" version="1" comment="rubygem-test-unit is &lt;3.6.1-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054399" version="1" comment="rubygem-typeprof is &lt;0.21.9-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054400" version="1" comment="rubygems is &lt;3.5.22-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054401" version="1" comment="rubygems-devel is &lt;3.5.22-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054402" version="1" comment="grafana is &lt;10.2.6-17.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054403" version="1" comment="grafana-selinux is &lt;10.2.6-17.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054404" version="1" comment="mysql is &lt;8.0.44-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054405" version="1" comment="mysql-common is &lt;8.0.44-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054406" version="1" comment="mysql-devel is &lt;8.0.44-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054407" version="1" comment="mysql-errmsg is &lt;8.0.44-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054408" version="1" comment="mysql-libs is &lt;8.0.44-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054409" version="1" comment="mysql-server is &lt;8.0.44-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054410" version="1" comment="mysql-test is &lt;8.0.44-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054411" version="1" comment="mysql is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054412" version="1" comment="mysql-common is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054413" version="1" comment="mysql-devel is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054414" version="1" comment="mysql-errmsg is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054415" version="1" comment="mysql-libs is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054416" version="1" comment="mysql-server is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054417" version="1" comment="mysql-test is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054418" version="1" comment="mysql-test-data is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054419" version="1" comment="wireshark is &lt;3.4.10-8.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054420" version="1" comment="wireshark-cli is &lt;3.4.10-8.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054421" version="1" comment="wireshark-devel is &lt;3.4.10-8.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054422" version="1" comment="keylime is &lt;7.12.1-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054423" version="1" comment="keylime-base is &lt;7.12.1-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054424" version="1" comment="keylime-registrar is &lt;7.12.1-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054425" version="1" comment="keylime-selinux is &lt;7.12.1-11.el9_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054426" version="1" comment="keylime-tenant is &lt;7.12.1-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054427" version="1" comment="keylime-verifier is &lt;7.12.1-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054428" version="1" comment="python3-keylime is &lt;7.12.1-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054429" version="1" comment="kernel is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054430" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.16.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054431" version="1" comment="kernel-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054432" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054433" version="1" comment="kernel-debug is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054434" version="1" comment="kernel-debug-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054435" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054436" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054437" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054438" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054439" version="1" comment="kernel-doc is &lt;5.14.0-611.16.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054440" version="1" comment="kernel-headers is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054441" version="1" comment="kernel-modules is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054442" version="1" comment="kernel-modules-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054443" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054444" version="1" comment="kernel-rt is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054445" version="1" comment="kernel-rt-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054446" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054447" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054448" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054449" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054450" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054451" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054452" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054453" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054454" version="1" comment="kernel-tools is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054455" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054456" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054457" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054458" version="1" comment="libperf is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054459" version="1" comment="perf is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054460" version="1" comment="python3-perf is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054461" version="1" comment="rtla is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054462" version="1" comment="rv is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985382" version="1" comment="apcu-panel is &lt;5.1.23-1.module+el9.6.0+22647+1741ae35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054463" version="1" comment="php is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054464" version="1" comment="php-bcmath is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054465" version="1" comment="php-cli is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054466" version="1" comment="php-common is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054467" version="1" comment="php-dba is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054468" version="1" comment="php-dbg is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054469" version="1" comment="php-devel is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054470" version="1" comment="php-embedded is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054471" version="1" comment="php-enchant is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054472" version="1" comment="php-ffi is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054473" version="1" comment="php-fpm is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054474" version="1" comment="php-gd is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054475" version="1" comment="php-gmp is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054476" version="1" comment="php-intl is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054477" version="1" comment="php-ldap is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054478" version="1" comment="php-mbstring is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054479" version="1" comment="php-mysqlnd is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054480" version="1" comment="php-odbc is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054481" version="1" comment="php-opcache is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054482" version="1" comment="php-pdo is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985403" version="1" comment="php-pecl-apcu is &lt;5.1.23-1.module+el9.6.0+22647+1741ae35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985404" version="1" comment="php-pecl-apcu-devel is &lt;5.1.23-1.module+el9.6.0+22647+1741ae35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985405" version="1" comment="php-pecl-redis6 is &lt;6.1.0-2.module+el9.6.0+22647+1741ae35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985406" version="1" comment="php-pecl-rrd is &lt;2.0.3-4.module+el9.6.0+22647+1741ae35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985407" version="1" comment="php-pecl-xdebug3 is &lt;3.3.1-1.module+el9.6.0+22647+1741ae35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985408" version="1" comment="php-pecl-zip is &lt;1.22.3-1.module+el9.6.0+22647+1741ae35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054483" version="1" comment="php-pgsql is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054484" version="1" comment="php-process is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054485" version="1" comment="php-snmp is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054486" version="1" comment="php-soap is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054487" version="1" comment="php-xml is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054488" version="1" comment="python3.12 is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054489" version="1" comment="python3.12-debug is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054490" version="1" comment="python3.12-devel is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054491" version="1" comment="python3.12-idle is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054492" version="1" comment="python3.12-libs is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054493" version="1" comment="python3.12-test is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054494" version="1" comment="python3.12-tkinter is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054495" version="1" comment="podman is &lt;5.6.0-9.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054496" version="1" comment="podman-docker is &lt;5.6.0-9.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054497" version="1" comment="podman-plugins is &lt;5.6.0-9.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054498" version="1" comment="podman-remote is &lt;5.6.0-9.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054499" version="1" comment="podman-tests is &lt;5.6.0-9.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054500" version="1" comment="skopeo is &lt;1.20.0-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054501" version="1" comment="skopeo-tests is &lt;1.20.0-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054502" version="1" comment="gcc-toolset-13-binutils is &lt;2.40-21.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054503" version="1" comment="gcc-toolset-13-binutils-devel is &lt;2.40-21.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054504" version="1" comment="gcc-toolset-13-binutils-gold is &lt;2.40-21.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054505" version="1" comment="python-unversioned-command is &lt;3.9.25-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054506" version="1" comment="python3 is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054507" version="1" comment="python3-debug is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054508" version="1" comment="python3-devel is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054509" version="1" comment="python3-idle is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054510" version="1" comment="python3-libs is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054511" version="1" comment="python3-test is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054512" version="1" comment="python3-tkinter is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054513" version="1" comment="binutils is &lt;2.35.2-67.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054514" version="1" comment="binutils-devel is &lt;2.35.2-67.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054515" version="1" comment="binutils-gold is &lt;2.35.2-67.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054516" version="1" comment="openssh is &lt;8.7p1-47.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054517" version="1" comment="openssh-askpass is &lt;8.7p1-47.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054518" version="1" comment="openssh-clients is &lt;8.7p1-47.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054519" version="1" comment="openssh-keycat is &lt;8.7p1-47.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054520" version="1" comment="openssh-server is &lt;8.7p1-47.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054521" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.47.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054522" version="1" comment="libssh is &lt;0.10.4-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054523" version="1" comment="libssh-config is &lt;0.10.4-17.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054524" version="1" comment="libssh-devel is &lt;0.10.4-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967866" version="1" comment="firefox is &lt;128.8.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967867" version="1" comment="firefox-x11 is &lt;128.8.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054525" version="1" comment="webkit2gtk3 is &lt;2.50.4-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054526" version="1" comment="webkit2gtk3-devel is &lt;2.50.4-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054527" version="1" comment="webkit2gtk3-jsc is &lt;2.50.4-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054528" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.50.4-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054529" version="1" comment="mod_md is &lt;2.4.26-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054530" version="1" comment="git-lfs is &lt;3.6.1-4.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054531" version="1" comment="thunderbird is &lt;140.6.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054532" version="1" comment="httpd is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054533" version="1" comment="httpd-core is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054534" version="1" comment="httpd-devel is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054535" version="1" comment="httpd-filesystem is &lt;2.4.62-7.el9_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054536" version="1" comment="httpd-manual is &lt;2.4.62-7.el9_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054537" version="1" comment="httpd-tools is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054538" version="1" comment="mod_ldap is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054539" version="1" comment="mod_lua is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054540" version="1" comment="mod_proxy_html is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054541" version="1" comment="mod_session is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054542" version="1" comment="mod_ssl is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968349" version="1" comment="pcs is &lt;0.11.8-1.el9_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968350" version="1" comment="pcs-snmp is &lt;0.11.8-1.el9_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967979" version="1" comment="tigervnc is &lt;1.14.1-1.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967980" version="1" comment="tigervnc-icons is &lt;1.14.1-1.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967981" version="1" comment="tigervnc-license is &lt;1.14.1-1.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967982" version="1" comment="tigervnc-selinux is &lt;1.14.1-1.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967983" version="1" comment="tigervnc-server is &lt;1.14.1-1.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967984" version="1" comment="tigervnc-server-minimal is &lt;1.14.1-1.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967985" version="1" comment="tigervnc-server-module is &lt;1.14.1-1.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968351" version="1" comment="bpftool is &lt;7.4.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968352" version="1" comment="kernel is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968353" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.31.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968354" version="1" comment="kernel-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968355" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968356" version="1" comment="kernel-debug is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968357" version="1" comment="kernel-debug-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968360" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968361" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968362" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968363" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968366" version="1" comment="kernel-doc is &lt;5.14.0-503.31.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968367" version="1" comment="kernel-headers is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968368" version="1" comment="kernel-modules is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968369" version="1" comment="kernel-modules-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968370" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968371" version="1" comment="kernel-rt is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968372" version="1" comment="kernel-rt-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968373" version="1" comment="kernel-rt-debug is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968374" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968376" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968377" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968378" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968379" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968381" version="1" comment="kernel-rt-kvm is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968382" version="1" comment="kernel-rt-modules is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968383" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968384" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968385" version="1" comment="kernel-tools is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968386" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968388" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968389" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968390" version="1" comment="libperf is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968391" version="1" comment="perf is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968392" version="1" comment="python3-perf is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968393" version="1" comment="rtla is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968394" version="1" comment="rv is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968395" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968396" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968397" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968398" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968399" version="1" comment="dotnet-host is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968400" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968401" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968402" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968403" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.104-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968404" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.104-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968405" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.104-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968406" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.104-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968407" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968408" version="1" comment="dotnet-templates-9.0 is &lt;9.0.104-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968409" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.104-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968410" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968411" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968412" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968413" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968414" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968415" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968416" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968417" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.114-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968418" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.114-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968419" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.114-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968420" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968421" version="1" comment="dotnet-templates-8.0 is &lt;8.0.114-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968422" version="1" comment="libxml2 is &lt;2.9.13-6.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968423" version="1" comment="libxml2-devel is &lt;2.9.13-6.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968424" version="1" comment="python3-libxml2 is &lt;2.9.13-6.el9_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968425" version="1" comment="webkit2gtk3 is &lt;2.46.6-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968426" version="1" comment="webkit2gtk3-devel is &lt;2.46.6-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968427" version="1" comment="webkit2gtk3-jsc is &lt;2.46.6-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968428" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.6-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968429" version="1" comment="grub2-common is &lt;2.06-94.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968430" version="1" comment="grub2-efi-x64 is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968431" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968432" version="1" comment="grub2-efi-x64-modules is &lt;2.06-94.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968433" version="1" comment="grub2-pc is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968434" version="1" comment="grub2-pc-modules is &lt;2.06-94.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968435" version="1" comment="grub2-tools is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968436" version="1" comment="grub2-tools-efi is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968437" version="1" comment="grub2-tools-extra is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968438" version="1" comment="grub2-tools-minimal is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968439" version="1" comment="thunderbird is &lt;128.8.0-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969562" version="1" comment="libxslt is &lt;1.1.34-9.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969563" version="1" comment="libxslt-devel is &lt;1.1.34-9.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970406" version="1" comment="fence-agents-aliyun is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970407" version="1" comment="fence-agents-all is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970408" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970409" version="1" comment="fence-agents-apc is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970410" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970411" version="1" comment="fence-agents-aws is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970412" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970413" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970414" version="1" comment="fence-agents-brocade is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970415" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970416" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970417" version="1" comment="fence-agents-common is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970418" version="1" comment="fence-agents-compute is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970419" version="1" comment="fence-agents-drac5 is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970420" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970421" version="1" comment="fence-agents-emerson is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970422" version="1" comment="fence-agents-eps is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970423" version="1" comment="fence-agents-gce is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970424" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970425" version="1" comment="fence-agents-hpblade is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970426" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970427" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970428" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970429" version="1" comment="fence-agents-ifmib is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970430" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970431" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970432" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970433" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970434" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970435" version="1" comment="fence-agents-ipdu is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970436" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970437" version="1" comment="fence-agents-kdump is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970438" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970439" version="1" comment="fence-agents-mpath is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970440" version="1" comment="fence-agents-openstack is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970441" version="1" comment="fence-agents-redfish is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970442" version="1" comment="fence-agents-rhevm is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970443" version="1" comment="fence-agents-rsa is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970444" version="1" comment="fence-agents-rsb is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970445" version="1" comment="fence-agents-sbd is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970446" version="1" comment="fence-agents-scsi is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970447" version="1" comment="fence-agents-virsh is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970448" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970449" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970450" version="1" comment="fence-agents-wti is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970451" version="1" comment="fence-virt is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970452" version="1" comment="fence-virtd is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970453" version="1" comment="fence-virtd-cpg is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970454" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970455" version="1" comment="fence-virtd-multicast is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970456" version="1" comment="fence-virtd-serial is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970457" version="1" comment="fence-virtd-tcp is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970458" version="1" comment="ha-cloud-support is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970459" version="1" comment="bpftool is &lt;7.4.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970460" version="1" comment="kernel is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970461" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.34.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970462" version="1" comment="kernel-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970463" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970464" version="1" comment="kernel-debug is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970465" version="1" comment="kernel-debug-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970468" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970469" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970470" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970471" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970474" version="1" comment="kernel-doc is &lt;5.14.0-503.34.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970475" version="1" comment="kernel-headers is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970476" version="1" comment="kernel-modules is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970477" version="1" comment="kernel-modules-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970478" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970479" version="1" comment="kernel-rt is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970480" version="1" comment="kernel-rt-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970481" version="1" comment="kernel-rt-debug is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970482" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970484" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970485" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970486" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970487" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970489" version="1" comment="kernel-rt-kvm is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970490" version="1" comment="kernel-rt-modules is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970491" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970492" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970493" version="1" comment="kernel-tools is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970494" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970496" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970497" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970498" version="1" comment="libperf is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970499" version="1" comment="perf is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970500" version="1" comment="python3-perf is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970501" version="1" comment="rtla is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970502" version="1" comment="rv is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970634" version="1" comment="nginx is &lt;1.22.1-8.module+el9.5.0+22953+b175c265.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970635" version="1" comment="nginx-all-modules is &lt;1.22.1-8.module+el9.5.0+22953+b175c265.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970636" version="1" comment="nginx-core is &lt;1.22.1-8.module+el9.5.0+22953+b175c265.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970637" version="1" comment="nginx-filesystem is &lt;1.22.1-8.module+el9.5.0+22953+b175c265.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970638" version="1" comment="nginx-mod-devel is &lt;1.22.1-8.module+el9.5.0+22953+b175c265.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970639" version="1" comment="nginx-mod-http-image-filter is &lt;1.22.1-8.module+el9.5.0+22953+b175c265.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970640" version="1" comment="nginx-mod-http-perl is &lt;1.22.1-8.module+el9.5.0+22953+b175c265.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970641" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.22.1-8.module+el9.5.0+22953+b175c265.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970642" version="1" comment="nginx-mod-mail is &lt;1.22.1-8.module+el9.5.0+22953+b175c265.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970643" version="1" comment="nginx-mod-stream is &lt;1.22.1-8.module+el9.5.0+22953+b175c265.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974172" version="1" comment="nginx is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974173" version="1" comment="nginx-all-modules is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974174" version="1" comment="nginx-core is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974175" version="1" comment="nginx-filesystem is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974176" version="1" comment="nginx-mod-devel is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974177" version="1" comment="nginx-mod-http-image-filter is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974178" version="1" comment="nginx-mod-http-perl is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974179" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974180" version="1" comment="nginx-mod-mail is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974181" version="1" comment="nginx-mod-stream is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974182" version="1" comment="podman is &lt;5.2.2-15.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974183" version="1" comment="podman-docker is &lt;5.2.2-15.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974184" version="1" comment="podman-plugins is &lt;5.2.2-15.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974185" version="1" comment="podman-remote is &lt;5.2.2-15.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974186" version="1" comment="podman-tests is &lt;5.2.2-15.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970644" version="1" comment="grafana is &lt;10.2.6-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970645" version="1" comment="grafana-selinux is &lt;10.2.6-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974187" version="1" comment="python3-jinja2 is &lt;2.11.3-8.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974188" version="1" comment="freetype is &lt;2.10.4-10.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974189" version="1" comment="freetype-devel is &lt;2.10.4-10.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974395" version="1" comment="bpftool is &lt;7.4.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974396" version="1" comment="kernel is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974397" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.35.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974398" version="1" comment="kernel-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974399" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974400" version="1" comment="kernel-debug is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974401" version="1" comment="kernel-debug-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974404" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974405" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974406" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974407" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974410" version="1" comment="kernel-doc is &lt;5.14.0-503.35.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974411" version="1" comment="kernel-headers is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974412" version="1" comment="kernel-modules is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974413" version="1" comment="kernel-modules-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974414" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974415" version="1" comment="kernel-rt is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974416" version="1" comment="kernel-rt-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974417" version="1" comment="kernel-rt-debug is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974418" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974420" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974421" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974422" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974423" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974425" version="1" comment="kernel-rt-kvm is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974426" version="1" comment="kernel-rt-modules is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974427" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974428" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974429" version="1" comment="kernel-tools is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974430" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974432" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974433" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974434" version="1" comment="libperf is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974435" version="1" comment="perf is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974436" version="1" comment="python3-perf is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974437" version="1" comment="rtla is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974438" version="1" comment="rv is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974190" version="1" comment="expat is &lt;2.5.0-3.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974191" version="1" comment="expat-devel is &lt;2.5.0-3.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974192" version="1" comment="firefox is &lt;128.9.0-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974193" version="1" comment="firefox-x11 is &lt;128.9.0-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974497" version="1" comment="gimp is &lt;2.99.8-4.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974498" version="1" comment="gimp-libs is &lt;2.99.8-4.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974499" version="1" comment="python3.12 is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974500" version="1" comment="python3.12-debug is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974501" version="1" comment="python3.12-devel is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974502" version="1" comment="python3.12-idle is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974503" version="1" comment="python3.12-libs is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974504" version="1" comment="python3.12-test is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974505" version="1" comment="python3.12-tkinter is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974606" version="1" comment="python3.11 is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974607" version="1" comment="python3.11-debug is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974608" version="1" comment="python3.11-devel is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974609" version="1" comment="python3.11-idle is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974610" version="1" comment="python3.11-libs is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974611" version="1" comment="python3.11-test is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974612" version="1" comment="python3.11-tkinter is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974613" version="1" comment="tomcat is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974614" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974615" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974616" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974617" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974618" version="1" comment="tomcat-lib is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974619" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974620" version="1" comment="tomcat-webapps is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974759" version="1" comment="webkit2gtk3 is &lt;2.48.1-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974760" version="1" comment="webkit2gtk3-devel is &lt;2.48.1-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974761" version="1" comment="webkit2gtk3-jsc is &lt;2.48.1-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974762" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.48.1-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974982" version="1" comment="delve is &lt;1.24.1-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974983" version="1" comment="go-toolset is &lt;1.23.6-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974984" version="1" comment="golang is &lt;1.23.6-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974985" version="1" comment="golang-bin is &lt;1.23.6-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974986" version="1" comment="golang-docs is &lt;1.23.6-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974987" version="1" comment="golang-misc is &lt;1.23.6-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974988" version="1" comment="golang-race is &lt;1.23.6-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974989" version="1" comment="golang-src is &lt;1.23.6-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974990" version="1" comment="golang-tests is &lt;1.23.6-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976053" version="1" comment="gvisor-tap-vsock is &lt;0.8.5-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976014" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976015" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.452.b09-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976016" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.452.b09-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976017" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.452.b09-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976018" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976019" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976020" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976021" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976022" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976023" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976024" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976025" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976026" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976027" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976028" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.452.b09-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976029" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.452.b09-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976030" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976031" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976032" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976033" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999610" version="1" comment="java-11-openjdk is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999549" version="1" comment="java-11-openjdk-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999611" version="1" comment="java-11-openjdk-demo is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999551" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999552" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999553" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999612" version="1" comment="java-11-openjdk-devel is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999555" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999556" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999557" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999558" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999613" version="1" comment="java-11-openjdk-headless is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999560" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999561" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999562" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999614" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999564" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999615" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999566" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999616" version="1" comment="java-11-openjdk-jmods is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999568" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999569" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999570" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999571" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999617" version="1" comment="java-11-openjdk-src is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999573" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999574" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999575" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999618" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999577" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999578" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999579" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976149" version="1" comment="java-17-openjdk is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976150" version="1" comment="java-17-openjdk-demo is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976151" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976152" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976153" version="1" comment="java-17-openjdk-devel is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976154" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976155" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976156" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976157" version="1" comment="java-17-openjdk-headless is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976158" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976159" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976160" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976161" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976162" version="1" comment="java-17-openjdk-jmods is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976163" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976164" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976165" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976166" version="1" comment="java-17-openjdk-src is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976167" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976168" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976169" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976170" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976171" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976253" version="1" comment="java-21-openjdk is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976254" version="1" comment="java-21-openjdk-demo is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976255" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976256" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976257" version="1" comment="java-21-openjdk-devel is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976258" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976259" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976260" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976261" version="1" comment="java-21-openjdk-headless is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976262" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976263" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976264" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976265" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976266" version="1" comment="java-21-openjdk-jmods is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976267" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976268" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976269" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976270" version="1" comment="java-21-openjdk-src is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976271" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976272" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976273" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976274" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976275" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975729" version="1" comment="bpftool is &lt;7.4.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975730" version="1" comment="kernel is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975731" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.38.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975732" version="1" comment="kernel-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975733" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975734" version="1" comment="kernel-debug is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975735" version="1" comment="kernel-debug-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975738" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975739" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975740" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975741" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975744" version="1" comment="kernel-doc is &lt;5.14.0-503.38.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975745" version="1" comment="kernel-headers is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975746" version="1" comment="kernel-modules is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975747" version="1" comment="kernel-modules-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975748" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975749" version="1" comment="kernel-rt is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975750" version="1" comment="kernel-rt-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975751" version="1" comment="kernel-rt-debug is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975752" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975754" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975755" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975756" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975757" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975759" version="1" comment="kernel-rt-kvm is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975760" version="1" comment="kernel-rt-modules is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975761" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975762" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975763" version="1" comment="kernel-tools is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975764" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975766" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975767" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975768" version="1" comment="libperf is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975769" version="1" comment="perf is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975770" version="1" comment="python3-perf is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975771" version="1" comment="rtla is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975772" version="1" comment="rv is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976045" version="1" comment="libxslt is &lt;1.1.34-9.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976046" version="1" comment="libxslt-devel is &lt;1.1.34-9.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976400" version="1" comment="thunderbird is &lt;128.9.0-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976562" version="1" comment="thunderbird is &lt;128.9.2-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976563" version="1" comment="glibc is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976564" version="1" comment="glibc-all-langpacks is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976565" version="1" comment="glibc-benchtests is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976566" version="1" comment="glibc-common is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976567" version="1" comment="glibc-devel is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976568" version="1" comment="glibc-doc is &lt;2.34-125.el9_5.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976569" version="1" comment="glibc-gconv-extra is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976570" version="1" comment="glibc-headers is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976571" version="1" comment="glibc-langpack-aa is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976572" version="1" comment="glibc-langpack-af is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976573" version="1" comment="glibc-langpack-agr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976574" version="1" comment="glibc-langpack-ak is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976575" version="1" comment="glibc-langpack-am is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976576" version="1" comment="glibc-langpack-an is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976577" version="1" comment="glibc-langpack-anp is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976578" version="1" comment="glibc-langpack-ar is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976579" version="1" comment="glibc-langpack-as is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976580" version="1" comment="glibc-langpack-ast is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976581" version="1" comment="glibc-langpack-ayc is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976582" version="1" comment="glibc-langpack-az is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976583" version="1" comment="glibc-langpack-be is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976584" version="1" comment="glibc-langpack-bem is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976585" version="1" comment="glibc-langpack-ber is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976586" version="1" comment="glibc-langpack-bg is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976587" version="1" comment="glibc-langpack-bhb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976588" version="1" comment="glibc-langpack-bho is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976589" version="1" comment="glibc-langpack-bi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976590" version="1" comment="glibc-langpack-bn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976591" version="1" comment="glibc-langpack-bo is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976592" version="1" comment="glibc-langpack-br is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976593" version="1" comment="glibc-langpack-brx is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976594" version="1" comment="glibc-langpack-bs is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976595" version="1" comment="glibc-langpack-byn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976596" version="1" comment="glibc-langpack-ca is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976597" version="1" comment="glibc-langpack-ce is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976598" version="1" comment="glibc-langpack-chr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976599" version="1" comment="glibc-langpack-ckb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976600" version="1" comment="glibc-langpack-cmn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976601" version="1" comment="glibc-langpack-crh is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976602" version="1" comment="glibc-langpack-cs is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976603" version="1" comment="glibc-langpack-csb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976604" version="1" comment="glibc-langpack-cv is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976605" version="1" comment="glibc-langpack-cy is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976606" version="1" comment="glibc-langpack-da is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976607" version="1" comment="glibc-langpack-de is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976608" version="1" comment="glibc-langpack-doi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976609" version="1" comment="glibc-langpack-dsb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976610" version="1" comment="glibc-langpack-dv is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976611" version="1" comment="glibc-langpack-dz is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976612" version="1" comment="glibc-langpack-el is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976613" version="1" comment="glibc-langpack-en is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976614" version="1" comment="glibc-langpack-eo is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976615" version="1" comment="glibc-langpack-es is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976616" version="1" comment="glibc-langpack-et is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976617" version="1" comment="glibc-langpack-eu is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976618" version="1" comment="glibc-langpack-fa is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976619" version="1" comment="glibc-langpack-ff is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976620" version="1" comment="glibc-langpack-fi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976621" version="1" comment="glibc-langpack-fil is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976622" version="1" comment="glibc-langpack-fo is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976623" version="1" comment="glibc-langpack-fr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976624" version="1" comment="glibc-langpack-fur is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976625" version="1" comment="glibc-langpack-fy is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976626" version="1" comment="glibc-langpack-ga is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976627" version="1" comment="glibc-langpack-gd is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976628" version="1" comment="glibc-langpack-gez is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976629" version="1" comment="glibc-langpack-gl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976630" version="1" comment="glibc-langpack-gu is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976631" version="1" comment="glibc-langpack-gv is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976632" version="1" comment="glibc-langpack-ha is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976633" version="1" comment="glibc-langpack-hak is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976634" version="1" comment="glibc-langpack-he is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976635" version="1" comment="glibc-langpack-hi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976636" version="1" comment="glibc-langpack-hif is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976637" version="1" comment="glibc-langpack-hne is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976638" version="1" comment="glibc-langpack-hr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976639" version="1" comment="glibc-langpack-hsb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976640" version="1" comment="glibc-langpack-ht is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976641" version="1" comment="glibc-langpack-hu is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976642" version="1" comment="glibc-langpack-hy is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976643" version="1" comment="glibc-langpack-ia is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976644" version="1" comment="glibc-langpack-id is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976645" version="1" comment="glibc-langpack-ig is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976646" version="1" comment="glibc-langpack-ik is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976647" version="1" comment="glibc-langpack-is is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976648" version="1" comment="glibc-langpack-it is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976649" version="1" comment="glibc-langpack-iu is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976650" version="1" comment="glibc-langpack-ja is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976651" version="1" comment="glibc-langpack-ka is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976652" version="1" comment="glibc-langpack-kab is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976653" version="1" comment="glibc-langpack-kk is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976654" version="1" comment="glibc-langpack-kl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976655" version="1" comment="glibc-langpack-km is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976656" version="1" comment="glibc-langpack-kn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976657" version="1" comment="glibc-langpack-ko is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976658" version="1" comment="glibc-langpack-kok is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976659" version="1" comment="glibc-langpack-ks is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976660" version="1" comment="glibc-langpack-ku is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976661" version="1" comment="glibc-langpack-kw is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976662" version="1" comment="glibc-langpack-ky is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976663" version="1" comment="glibc-langpack-lb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976664" version="1" comment="glibc-langpack-lg is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976665" version="1" comment="glibc-langpack-li is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976666" version="1" comment="glibc-langpack-lij is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976667" version="1" comment="glibc-langpack-ln is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976668" version="1" comment="glibc-langpack-lo is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976669" version="1" comment="glibc-langpack-lt is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976670" version="1" comment="glibc-langpack-lv is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976671" version="1" comment="glibc-langpack-lzh is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976672" version="1" comment="glibc-langpack-mag is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976673" version="1" comment="glibc-langpack-mai is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976674" version="1" comment="glibc-langpack-mfe is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976675" version="1" comment="glibc-langpack-mg is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976676" version="1" comment="glibc-langpack-mhr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976677" version="1" comment="glibc-langpack-mi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976678" version="1" comment="glibc-langpack-miq is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976679" version="1" comment="glibc-langpack-mjw is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976680" version="1" comment="glibc-langpack-mk is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976681" version="1" comment="glibc-langpack-ml is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976682" version="1" comment="glibc-langpack-mn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976683" version="1" comment="glibc-langpack-mni is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976684" version="1" comment="glibc-langpack-mnw is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976685" version="1" comment="glibc-langpack-mr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976686" version="1" comment="glibc-langpack-ms is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976687" version="1" comment="glibc-langpack-mt is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976688" version="1" comment="glibc-langpack-my is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976689" version="1" comment="glibc-langpack-nan is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976690" version="1" comment="glibc-langpack-nb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976691" version="1" comment="glibc-langpack-nds is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976692" version="1" comment="glibc-langpack-ne is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976693" version="1" comment="glibc-langpack-nhn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976694" version="1" comment="glibc-langpack-niu is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976695" version="1" comment="glibc-langpack-nl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976696" version="1" comment="glibc-langpack-nn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976697" version="1" comment="glibc-langpack-nr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976698" version="1" comment="glibc-langpack-nso is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976699" version="1" comment="glibc-langpack-oc is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976700" version="1" comment="glibc-langpack-om is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976701" version="1" comment="glibc-langpack-or is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976702" version="1" comment="glibc-langpack-os is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976703" version="1" comment="glibc-langpack-pa is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976704" version="1" comment="glibc-langpack-pap is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976705" version="1" comment="glibc-langpack-pl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976706" version="1" comment="glibc-langpack-ps is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976707" version="1" comment="glibc-langpack-pt is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976708" version="1" comment="glibc-langpack-quz is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976709" version="1" comment="glibc-langpack-raj is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976710" version="1" comment="glibc-langpack-ro is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976711" version="1" comment="glibc-langpack-ru is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976712" version="1" comment="glibc-langpack-rw is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976713" version="1" comment="glibc-langpack-sa is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976714" version="1" comment="glibc-langpack-sah is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976715" version="1" comment="glibc-langpack-sat is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976716" version="1" comment="glibc-langpack-sc is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976717" version="1" comment="glibc-langpack-sd is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976718" version="1" comment="glibc-langpack-se is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976719" version="1" comment="glibc-langpack-sgs is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976720" version="1" comment="glibc-langpack-shn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976721" version="1" comment="glibc-langpack-shs is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976722" version="1" comment="glibc-langpack-si is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976723" version="1" comment="glibc-langpack-sid is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976724" version="1" comment="glibc-langpack-sk is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976725" version="1" comment="glibc-langpack-sl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976726" version="1" comment="glibc-langpack-sm is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976727" version="1" comment="glibc-langpack-so is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976728" version="1" comment="glibc-langpack-sq is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976729" version="1" comment="glibc-langpack-sr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976730" version="1" comment="glibc-langpack-ss is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976731" version="1" comment="glibc-langpack-st is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976732" version="1" comment="glibc-langpack-sv is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976733" version="1" comment="glibc-langpack-sw is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976734" version="1" comment="glibc-langpack-szl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976735" version="1" comment="glibc-langpack-ta is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976736" version="1" comment="glibc-langpack-tcy is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976737" version="1" comment="glibc-langpack-te is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976738" version="1" comment="glibc-langpack-tg is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976739" version="1" comment="glibc-langpack-th is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976740" version="1" comment="glibc-langpack-the is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976741" version="1" comment="glibc-langpack-ti is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976742" version="1" comment="glibc-langpack-tig is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976743" version="1" comment="glibc-langpack-tk is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976744" version="1" comment="glibc-langpack-tl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976745" version="1" comment="glibc-langpack-tn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976746" version="1" comment="glibc-langpack-to is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976747" version="1" comment="glibc-langpack-tpi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976748" version="1" comment="glibc-langpack-tr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976749" version="1" comment="glibc-langpack-ts is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976750" version="1" comment="glibc-langpack-tt is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976751" version="1" comment="glibc-langpack-ug is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976752" version="1" comment="glibc-langpack-uk is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976753" version="1" comment="glibc-langpack-unm is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976754" version="1" comment="glibc-langpack-ur is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976755" version="1" comment="glibc-langpack-uz is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976756" version="1" comment="glibc-langpack-ve is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976757" version="1" comment="glibc-langpack-vi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976758" version="1" comment="glibc-langpack-wa is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976759" version="1" comment="glibc-langpack-wae is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976760" version="1" comment="glibc-langpack-wal is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976761" version="1" comment="glibc-langpack-wo is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976762" version="1" comment="glibc-langpack-xh is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976763" version="1" comment="glibc-langpack-yi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976764" version="1" comment="glibc-langpack-yo is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976765" version="1" comment="glibc-langpack-yue is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976766" version="1" comment="glibc-langpack-yuw is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976767" version="1" comment="glibc-langpack-zh is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976768" version="1" comment="glibc-langpack-zu is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976769" version="1" comment="glibc-locale-source is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976770" version="1" comment="glibc-minimal-langpack is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976771" version="1" comment="glibc-nss-devel is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976772" version="1" comment="glibc-static is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976773" version="1" comment="glibc-utils is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976774" version="1" comment="libnsl is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976775" version="1" comment="nscd is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976776" version="1" comment="nss_db is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976777" version="1" comment="nss_hesiod is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976778" version="1" comment="php is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976779" version="1" comment="php-bcmath is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976780" version="1" comment="php-cli is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976781" version="1" comment="php-common is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976782" version="1" comment="php-dba is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976783" version="1" comment="php-dbg is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976784" version="1" comment="php-devel is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976785" version="1" comment="php-embedded is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976786" version="1" comment="php-enchant is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976787" version="1" comment="php-ffi is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976788" version="1" comment="php-fpm is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976789" version="1" comment="php-gd is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976790" version="1" comment="php-gmp is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976791" version="1" comment="php-intl is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976792" version="1" comment="php-ldap is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976793" version="1" comment="php-mbstring is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976794" version="1" comment="php-mysqlnd is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976795" version="1" comment="php-odbc is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976796" version="1" comment="php-opcache is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976797" version="1" comment="php-pdo is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976798" version="1" comment="php-pgsql is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976799" version="1" comment="php-process is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976800" version="1" comment="php-snmp is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976801" version="1" comment="php-soap is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976802" version="1" comment="php-xml is &lt;8.1.32-1.module+el9.5.0+23047+aadb97d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977299" version="1" comment="bpftool is &lt;7.4.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977300" version="1" comment="kernel is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977301" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.40.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977302" version="1" comment="kernel-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977303" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977304" version="1" comment="kernel-debug is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977305" version="1" comment="kernel-debug-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977308" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977309" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977310" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977311" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977314" version="1" comment="kernel-doc is &lt;5.14.0-503.40.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977315" version="1" comment="kernel-headers is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977316" version="1" comment="kernel-modules is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977317" version="1" comment="kernel-modules-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977318" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977319" version="1" comment="kernel-rt is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977320" version="1" comment="kernel-rt-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977321" version="1" comment="kernel-rt-debug is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977322" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977324" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977325" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977326" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977327" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977329" version="1" comment="kernel-rt-kvm is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977330" version="1" comment="kernel-rt-modules is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977331" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977332" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977333" version="1" comment="kernel-tools is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977334" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977336" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977337" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977338" version="1" comment="libperf is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977339" version="1" comment="perf is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977340" version="1" comment="python3-perf is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977341" version="1" comment="rtla is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977342" version="1" comment="rv is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977554" version="1" comment="firefox is &lt;128.10.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977555" version="1" comment="firefox-x11 is &lt;128.10.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977556" version="1" comment="thunderbird is &lt;128.10.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981850" version="1" comment="ruby is &lt;3.0.7-165.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981851" version="1" comment="ruby-default-gems is &lt;3.0.7-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981852" version="1" comment="ruby-devel is &lt;3.0.7-165.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981853" version="1" comment="ruby-doc is &lt;3.0.7-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981854" version="1" comment="ruby-libs is &lt;3.0.7-165.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981855" version="1" comment="rubygem-bigdecimal is &lt;3.0.0-165.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981856" version="1" comment="rubygem-bundler is &lt;2.2.33-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981857" version="1" comment="rubygem-io-console is &lt;0.5.7-165.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981858" version="1" comment="rubygem-irb is &lt;1.3.5-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981859" version="1" comment="rubygem-json is &lt;2.5.1-165.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981860" version="1" comment="rubygem-minitest is &lt;5.14.2-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981861" version="1" comment="rubygem-power_assert is &lt;1.2.1-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981862" version="1" comment="rubygem-psych is &lt;3.3.2-165.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981863" version="1" comment="rubygem-rake is &lt;13.0.3-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981864" version="1" comment="rubygem-rbs is &lt;1.4.0-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981865" version="1" comment="rubygem-rdoc is &lt;6.3.4.1-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981866" version="1" comment="rubygem-rexml is &lt;3.2.5-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981867" version="1" comment="rubygem-rss is &lt;0.2.9-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981868" version="1" comment="rubygem-test-unit is &lt;3.3.7-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981869" version="1" comment="rubygem-typeprof is &lt;0.15.2-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981870" version="1" comment="rubygems is &lt;3.2.33-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981871" version="1" comment="rubygems-devel is &lt;3.2.33-165.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977557" version="1" comment="ruby is &lt;3.1.7-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977558" version="1" comment="ruby-bundled-gems is &lt;3.1.7-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977559" version="1" comment="ruby-default-gems is &lt;3.1.7-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977560" version="1" comment="ruby-devel is &lt;3.1.7-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977561" version="1" comment="ruby-doc is &lt;3.1.7-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977562" version="1" comment="ruby-libs is &lt;3.1.7-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977563" version="1" comment="rubygem-bigdecimal is &lt;3.1.1-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977564" version="1" comment="rubygem-bundler is &lt;2.3.27-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977565" version="1" comment="rubygem-io-console is &lt;0.5.11-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977566" version="1" comment="rubygem-irb is &lt;1.4.1-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977567" version="1" comment="rubygem-json is &lt;2.6.1-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977568" version="1" comment="rubygem-minitest is &lt;5.15.0-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977569" version="1" comment="rubygem-power_assert is &lt;2.0.1-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977570" version="1" comment="rubygem-psych is &lt;4.0.4-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977571" version="1" comment="rubygem-rake is &lt;13.0.6-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977572" version="1" comment="rubygem-rbs is &lt;2.7.0-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977573" version="1" comment="rubygem-rdoc is &lt;6.4.1.1-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977574" version="1" comment="rubygem-rexml is &lt;3.3.9-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977575" version="1" comment="rubygem-rss is &lt;0.3.1-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977576" version="1" comment="rubygem-test-unit is &lt;3.5.3-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977577" version="1" comment="rubygem-typeprof is &lt;0.21.3-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977578" version="1" comment="rubygems is &lt;3.3.27-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977579" version="1" comment="rubygems-devel is &lt;3.3.27-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977580" version="1" comment="389-ds-base is &lt;2.5.2-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977581" version="1" comment="389-ds-base-devel is &lt;2.5.2-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977582" version="1" comment="389-ds-base-libs is &lt;2.5.2-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977583" version="1" comment="389-ds-base-snmp is &lt;2.5.2-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977584" version="1" comment="python3-lib389 is &lt;2.5.2-9.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981936" version="1" comment="qemu-guest-agent is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981937" version="1" comment="qemu-img is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981938" version="1" comment="qemu-kvm is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981939" version="1" comment="qemu-kvm-audio-pa is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981940" version="1" comment="qemu-kvm-block-blkio is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981941" version="1" comment="qemu-kvm-block-curl is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981942" version="1" comment="qemu-kvm-block-rbd is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981943" version="1" comment="qemu-kvm-common is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981944" version="1" comment="qemu-kvm-core is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981945" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981946" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981947" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981948" version="1" comment="qemu-kvm-device-usb-host is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981949" version="1" comment="qemu-kvm-device-usb-redirect is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981950" version="1" comment="qemu-kvm-docs is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981951" version="1" comment="qemu-kvm-tools is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981952" version="1" comment="qemu-kvm-ui-egl-headless is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981953" version="1" comment="qemu-kvm-ui-opengl is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981954" version="1" comment="qemu-pr-helper is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985952" version="1" comment="ruby is &lt;3.3.8-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985953" version="1" comment="ruby-bundled-gems is &lt;3.3.8-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985954" version="1" comment="ruby-default-gems is &lt;3.3.8-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985955" version="1" comment="ruby-devel is &lt;3.3.8-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985956" version="1" comment="ruby-doc is &lt;3.3.8-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985957" version="1" comment="ruby-libs is &lt;3.3.8-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985958" version="1" comment="rubygem-bigdecimal is &lt;3.1.5-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985959" version="1" comment="rubygem-bundler is &lt;2.5.22-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985960" version="1" comment="rubygem-io-console is &lt;0.7.1-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985961" version="1" comment="rubygem-irb is &lt;1.13.1-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985962" version="1" comment="rubygem-json is &lt;2.7.2-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985963" version="1" comment="rubygem-minitest is &lt;5.20.0-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985964" version="1" comment="rubygem-power_assert is &lt;2.0.3-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985965" version="1" comment="rubygem-psych is &lt;5.1.2-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985966" version="1" comment="rubygem-racc is &lt;1.7.3-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985967" version="1" comment="rubygem-rake is &lt;13.1.0-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985968" version="1" comment="rubygem-rbs is &lt;3.4.0-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985969" version="1" comment="rubygem-rdoc is &lt;6.6.3.1-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985970" version="1" comment="rubygem-rexml is &lt;3.3.9-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985971" version="1" comment="rubygem-rss is &lt;0.3.1-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985972" version="1" comment="rubygem-test-unit is &lt;3.6.1-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985973" version="1" comment="rubygem-typeprof is &lt;0.21.9-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985974" version="1" comment="rubygems is &lt;3.5.22-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985975" version="1" comment="rubygems-devel is &lt;3.5.22-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981955" version="1" comment="emacs is &lt;27.2-11.el9_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981956" version="1" comment="emacs-common is &lt;27.2-11.el9_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981957" version="1" comment="emacs-filesystem is &lt;27.2-11.el9_5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981958" version="1" comment="emacs-lucid is &lt;27.2-11.el9_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981959" version="1" comment="emacs-nox is &lt;27.2-11.el9_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985522" version="1" comment="kernel is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985523" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.12.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985524" version="1" comment="kernel-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985525" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985526" version="1" comment="kernel-debug is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985527" version="1" comment="kernel-debug-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985530" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985531" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985532" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985533" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985536" version="1" comment="kernel-doc is &lt;5.14.0-570.12.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985537" version="1" comment="kernel-headers is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985538" version="1" comment="kernel-modules is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985539" version="1" comment="kernel-modules-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985540" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985541" version="1" comment="kernel-rt is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985542" version="1" comment="kernel-rt-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985543" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985544" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985546" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985547" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985548" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985549" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985551" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985552" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985553" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985554" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985555" version="1" comment="kernel-tools is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985556" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985558" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985559" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985560" version="1" comment="libperf is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985561" version="1" comment="perf is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985562" version="1" comment="python3-perf is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985563" version="1" comment="rtla is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985564" version="1" comment="rv is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983856" version="1" comment="python-unversioned-command is &lt;3.9.21-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983857" version="1" comment="python3 is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983858" version="1" comment="python3-debug is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983859" version="1" comment="python3-devel is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983860" version="1" comment="python3-idle is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983861" version="1" comment="python3-libs is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983862" version="1" comment="python3-test is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983863" version="1" comment="python3-tkinter is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984827" version="1" comment="grub2-common is &lt;2.06-104.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984828" version="1" comment="grub2-efi-x64 is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984829" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984830" version="1" comment="grub2-efi-x64-modules is &lt;2.06-104.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984831" version="1" comment="grub2-pc is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984832" version="1" comment="grub2-pc-modules is &lt;2.06-104.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984833" version="1" comment="grub2-tools is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984834" version="1" comment="grub2-tools-efi is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984835" version="1" comment="grub2-tools-extra is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984836" version="1" comment="grub2-tools-minimal is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983864" version="1" comment="openssh is &lt;8.7p1-45.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983865" version="1" comment="openssh-askpass is &lt;8.7p1-45.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983866" version="1" comment="openssh-clients is &lt;8.7p1-45.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983867" version="1" comment="openssh-keycat is &lt;8.7p1-45.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983868" version="1" comment="openssh-server is &lt;8.7p1-45.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983869" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.45.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984837" version="1" comment="microcode_ctl is &lt;20250211-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983870" version="1" comment="python3-requests is &lt;2.25.1-9.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983871" version="1" comment="python3-requests+security is &lt;2.25.1-9.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983872" version="1" comment="python3-requests+socks is &lt;2.25.1-9.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983873" version="1" comment="rsync is &lt;3.2.5-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983874" version="1" comment="rsync-daemon is &lt;3.2.5-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983875" version="1" comment="rsync-rrsync is &lt;3.2.5-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984838" version="1" comment="iptraf-ng is &lt;1.2.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983876" version="1" comment="krb5-devel is &lt;1.21.1-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983877" version="1" comment="krb5-libs is &lt;1.21.1-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983878" version="1" comment="krb5-pkinit is &lt;1.21.1-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983879" version="1" comment="krb5-server is &lt;1.21.1-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983880" version="1" comment="krb5-server-ldap is &lt;1.21.1-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983881" version="1" comment="krb5-workstation is &lt;1.21.1-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983882" version="1" comment="libkadm5 is &lt;1.21.1-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985323" version="1" comment="gnutls is &lt;3.8.3-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985324" version="1" comment="gnutls-c++ is &lt;3.8.3-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985325" version="1" comment="gnutls-dane is &lt;3.8.3-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985326" version="1" comment="gnutls-devel is &lt;3.8.3-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985327" version="1" comment="gnutls-utils is &lt;3.8.3-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985328" version="1" comment="libtasn1 is &lt;4.16.0-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985329" version="1" comment="libtasn1-devel is &lt;4.16.0-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985330" version="1" comment="libtasn1-tools is &lt;4.16.0-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983883" version="1" comment="aardvark-dns is &lt;1.14.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983884" version="1" comment="python3.12 is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983885" version="1" comment="python3.12-debug is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983886" version="1" comment="python3.12-devel is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983887" version="1" comment="python3.12-idle is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983888" version="1" comment="python3.12-libs is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983889" version="1" comment="python3.12-test is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983890" version="1" comment="python3.12-tkinter is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983891" version="1" comment="python3.11 is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983892" version="1" comment="python3.11-debug is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983893" version="1" comment="python3.11-devel is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983894" version="1" comment="python3.11-idle is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983895" version="1" comment="python3.11-libs is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983896" version="1" comment="python3.11-test is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983897" version="1" comment="python3.11-tkinter is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985331" version="1" comment="protobuf is &lt;3.14.0-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985332" version="1" comment="protobuf-compiler is &lt;3.14.0-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985333" version="1" comment="protobuf-devel is &lt;3.14.0-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985334" version="1" comment="protobuf-lite is &lt;3.14.0-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985335" version="1" comment="protobuf-lite-devel is &lt;3.14.0-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985336" version="1" comment="python3-protobuf is &lt;3.14.0-16.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983898" version="1" comment="rpm-ostree is &lt;2025.5-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983899" version="1" comment="rpm-ostree-libs is &lt;2025.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983900" version="1" comment="bootc is &lt;1.1.6-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983901" version="1" comment="system-reinstall-bootc is &lt;1.1.6-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983902" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-28.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983903" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-28.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983904" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-28.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983905" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-28.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983906" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-28.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983907" version="1" comment="xorg-x11-server-common is &lt;1.20.11-28.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983908" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-28.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983909" version="1" comment="xorg-x11-server-source is &lt;1.20.11-28.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983910" version="1" comment="xorg-x11-server-Xwayland is &lt;23.2.7-3.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983911" version="1" comment="xorg-x11-server-Xwayland-devel is &lt;23.2.7-3.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985811" version="1" comment="gstreamer1 is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985812" version="1" comment="gstreamer1-devel is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985813" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985814" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985815" version="1" comment="gstreamer1-plugins-bad-free-libs is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985816" version="1" comment="gstreamer1-plugins-ugly-free is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985817" version="1" comment="gstreamer1-rtsp-server is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985337" version="1" comment="corosync is &lt;3.1.9-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985338" version="1" comment="corosync-vqsim is &lt;3.1.9-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985339" version="1" comment="corosynclib is &lt;3.1.9-2.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985340" version="1" comment="corosynclib-devel is &lt;3.1.9-2.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985341" version="1" comment="bootupd is &lt;0.2.27-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985863" version="1" comment="gstreamer1-plugins-good is &lt;1.22.12-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985864" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.22.12-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983912" version="1" comment="gstreamer1-plugins-base is &lt;1.22.12-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983913" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.22.12-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983914" version="1" comment="gstreamer1-plugins-base-tools is &lt;1.22.12-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983915" version="1" comment="git-lfs is &lt;3.6.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983916" version="1" comment="openjpeg2 is &lt;2.4.0-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983917" version="1" comment="openjpeg2-devel is &lt;2.4.0-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983918" version="1" comment="openjpeg2-tools is &lt;2.4.0-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983919" version="1" comment="keylime-agent-rust is &lt;0.2.2-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985342" version="1" comment="php is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985343" version="1" comment="php-bcmath is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985344" version="1" comment="php-cli is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985345" version="1" comment="php-common is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985346" version="1" comment="php-dba is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985347" version="1" comment="php-dbg is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985348" version="1" comment="php-devel is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985349" version="1" comment="php-embedded is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985350" version="1" comment="php-enchant is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985351" version="1" comment="php-ffi is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985352" version="1" comment="php-fpm is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985353" version="1" comment="php-gd is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985354" version="1" comment="php-gmp is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985355" version="1" comment="php-intl is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985356" version="1" comment="php-ldap is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985357" version="1" comment="php-mbstring is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985358" version="1" comment="php-mysqlnd is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985359" version="1" comment="php-odbc is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985360" version="1" comment="php-opcache is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985361" version="1" comment="php-pdo is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985362" version="1" comment="php-pgsql is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985363" version="1" comment="php-process is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985364" version="1" comment="php-snmp is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985365" version="1" comment="php-soap is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985366" version="1" comment="php-xml is &lt;8.0.30-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985367" version="1" comment="python3.12-cryptography is &lt;41.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985368" version="1" comment="nginx is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985369" version="1" comment="nginx-all-modules is &lt;1.20.1-22.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985370" version="1" comment="nginx-core is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985371" version="1" comment="nginx-filesystem is &lt;1.20.1-22.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985372" version="1" comment="nginx-mod-devel is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985373" version="1" comment="nginx-mod-http-image-filter is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985374" version="1" comment="nginx-mod-http-perl is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985375" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985376" version="1" comment="nginx-mod-mail is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985377" version="1" comment="nginx-mod-stream is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983920" version="1" comment="webkit2gtk3 is &lt;2.48.1-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983921" version="1" comment="webkit2gtk3-devel is &lt;2.48.1-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983922" version="1" comment="webkit2gtk3-jsc is &lt;2.48.1-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983923" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.48.1-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985565" version="1" comment="buildah is &lt;1.39.4-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985566" version="1" comment="buildah-tests is &lt;1.39.4-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983924" version="1" comment="podman is &lt;5.4.0-9.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983925" version="1" comment="podman-docker is &lt;5.4.0-9.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983926" version="1" comment="podman-plugins is &lt;5.4.0-9.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983927" version="1" comment="podman-remote is &lt;5.4.0-9.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983928" version="1" comment="podman-tests is &lt;5.4.0-9.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983929" version="1" comment="389-ds-base is &lt;2.6.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983930" version="1" comment="389-ds-base-devel is &lt;2.6.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983931" version="1" comment="389-ds-base-libs is &lt;2.6.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983932" version="1" comment="389-ds-base-snmp is &lt;2.6.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983933" version="1" comment="python3-lib389 is &lt;2.6.1-8.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985976" version="1" comment="skopeo is &lt;1.18.1-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985977" version="1" comment="skopeo-tests is &lt;1.18.1-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983934" version="1" comment="nginx is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983935" version="1" comment="nginx-all-modules is &lt;1.20.1-22.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983936" version="1" comment="nginx-core is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983937" version="1" comment="nginx-filesystem is &lt;1.20.1-22.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983938" version="1" comment="nginx-mod-devel is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983939" version="1" comment="nginx-mod-http-image-filter is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983940" version="1" comment="nginx-mod-http-perl is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983941" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983942" version="1" comment="nginx-mod-mail is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983943" version="1" comment="nginx-mod-stream is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985378" version="1" comment="grafana is &lt;10.2.6-11.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985379" version="1" comment="grafana-selinux is &lt;10.2.6-11.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983944" version="1" comment="git is &lt;2.47.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983945" version="1" comment="git-all is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983946" version="1" comment="git-core is &lt;2.47.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983947" version="1" comment="git-core-doc is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983948" version="1" comment="git-credential-libsecret is &lt;2.47.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983949" version="1" comment="git-daemon is &lt;2.47.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983950" version="1" comment="git-email is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983951" version="1" comment="git-gui is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983952" version="1" comment="git-instaweb is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983953" version="1" comment="git-subtree is &lt;2.47.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983954" version="1" comment="git-svn is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983955" version="1" comment="gitk is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983956" version="1" comment="gitweb is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983957" version="1" comment="perl-Git is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983958" version="1" comment="perl-Git-SVN is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983959" version="1" comment="libxslt is &lt;1.1.34-13.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983960" version="1" comment="libxslt-devel is &lt;1.1.34-13.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985380" version="1" comment="gvisor-tap-vsock is &lt;0.8.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985381" version="1" comment="gvisor-tap-vsock-gvforwarder is &lt;0.8.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983961" version="1" comment="gimp is &lt;2.99.8-4.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983962" version="1" comment="gimp-libs is &lt;2.99.8-4.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985383" version="1" comment="php is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985384" version="1" comment="php-bcmath is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985385" version="1" comment="php-cli is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985386" version="1" comment="php-common is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985387" version="1" comment="php-dba is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985388" version="1" comment="php-dbg is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985389" version="1" comment="php-devel is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985390" version="1" comment="php-embedded is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985391" version="1" comment="php-enchant is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985392" version="1" comment="php-ffi is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985393" version="1" comment="php-fpm is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985394" version="1" comment="php-gd is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985395" version="1" comment="php-gmp is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985396" version="1" comment="php-intl is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985397" version="1" comment="php-ldap is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985398" version="1" comment="php-mbstring is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985399" version="1" comment="php-mysqlnd is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985400" version="1" comment="php-odbc is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985401" version="1" comment="php-opcache is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985402" version="1" comment="php-pdo is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985409" version="1" comment="php-pgsql is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985410" version="1" comment="php-process is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985411" version="1" comment="php-snmp is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985412" version="1" comment="php-soap is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985413" version="1" comment="php-xml is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983963" version="1" comment="mod_auth_openidc is &lt;2.4.10-1.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983964" version="1" comment="ghostscript is &lt;9.54.0-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983965" version="1" comment="ghostscript-doc is &lt;9.54.0-18.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983966" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-18.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983967" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983968" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983969" version="1" comment="ghostscript-x11 is &lt;9.54.0-18.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983970" version="1" comment="libgs is &lt;9.54.0-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983971" version="1" comment="libgs-devel is &lt;9.54.0-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985567" version="1" comment="kernel is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985568" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.16.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985569" version="1" comment="kernel-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985570" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985571" version="1" comment="kernel-debug is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985572" version="1" comment="kernel-debug-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985575" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985576" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985577" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985578" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985581" version="1" comment="kernel-doc is &lt;5.14.0-570.16.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985582" version="1" comment="kernel-headers is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985583" version="1" comment="kernel-modules is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985584" version="1" comment="kernel-modules-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985585" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985586" version="1" comment="kernel-rt is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985587" version="1" comment="kernel-rt-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985588" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985589" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985591" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985592" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985593" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985594" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985596" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985597" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985598" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985599" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985600" version="1" comment="kernel-tools is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985601" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985603" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985604" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985605" version="1" comment="libperf is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985606" version="1" comment="perf is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985607" version="1" comment="python3-perf is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985608" version="1" comment="rtla is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985609" version="1" comment="rv is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985414" version="1" comment="nodejs is &lt;20.19.1-1.module+el9.6.0+23053+4195b0b2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985415" version="1" comment="nodejs-devel is &lt;20.19.1-1.module+el9.6.0+23053+4195b0b2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985416" version="1" comment="nodejs-docs is &lt;20.19.1-1.module+el9.6.0+23053+4195b0b2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985417" version="1" comment="nodejs-full-i18n is &lt;20.19.1-1.module+el9.6.0+23053+4195b0b2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985418" version="1" comment="npm is &lt;10.8.2-1.20.19.1.1.module+el9.6.0+23053+4195b0b2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983972" version="1" comment="xterm is &lt;366-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983973" version="1" comment="xterm-resize is &lt;366-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983974" version="1" comment="firefox is &lt;128.10.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983975" version="1" comment="firefox-x11 is &lt;128.10.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983976" version="1" comment="redis is &lt;7.2.8-1.module+el9.6.0+23049+8374f320 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983977" version="1" comment="redis-devel is &lt;7.2.8-1.module+el9.6.0+23049+8374f320 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983978" version="1" comment="redis-doc is &lt;7.2.8-1.module+el9.6.0+23049+8374f320 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983979" version="1" comment="yelp is &lt;40.3-2.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983980" version="1" comment="yelp-devel is &lt;40.3-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983981" version="1" comment="yelp-libs is &lt;40.3-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983982" version="1" comment="php is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983983" version="1" comment="php-bcmath is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983984" version="1" comment="php-cli is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983985" version="1" comment="php-common is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983986" version="1" comment="php-dba is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983987" version="1" comment="php-dbg is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983988" version="1" comment="php-devel is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983989" version="1" comment="php-embedded is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983990" version="1" comment="php-enchant is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983991" version="1" comment="php-ffi is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983992" version="1" comment="php-fpm is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983993" version="1" comment="php-gd is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983994" version="1" comment="php-gmp is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983995" version="1" comment="php-intl is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983996" version="1" comment="php-ldap is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983997" version="1" comment="php-mbstring is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983998" version="1" comment="php-mysqlnd is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983999" version="1" comment="php-odbc is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984000" version="1" comment="php-opcache is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984001" version="1" comment="php-pdo is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984002" version="1" comment="php-pgsql is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984003" version="1" comment="php-process is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984004" version="1" comment="php-snmp is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984005" version="1" comment="php-soap is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984006" version="1" comment="php-xml is &lt;8.0.30-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985419" version="1" comment="php is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985420" version="1" comment="php-bcmath is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985421" version="1" comment="php-cli is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985422" version="1" comment="php-common is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985423" version="1" comment="php-dba is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985424" version="1" comment="php-dbg is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985425" version="1" comment="php-devel is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985426" version="1" comment="php-embedded is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985427" version="1" comment="php-enchant is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985428" version="1" comment="php-ffi is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985429" version="1" comment="php-fpm is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985430" version="1" comment="php-gd is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985431" version="1" comment="php-gmp is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985432" version="1" comment="php-intl is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985433" version="1" comment="php-ldap is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985434" version="1" comment="php-mbstring is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985435" version="1" comment="php-mysqlnd is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985436" version="1" comment="php-odbc is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985437" version="1" comment="php-opcache is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985438" version="1" comment="php-pdo is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985439" version="1" comment="php-pgsql is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985440" version="1" comment="php-process is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985441" version="1" comment="php-snmp is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985442" version="1" comment="php-soap is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985443" version="1" comment="php-xml is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984007" version="1" comment="nodejs is &lt;22.15.0-1.module+el9.6.0+23062+9e7801b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984008" version="1" comment="nodejs-devel is &lt;22.15.0-1.module+el9.6.0+23062+9e7801b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984009" version="1" comment="nodejs-docs is &lt;22.15.0-1.module+el9.6.0+23062+9e7801b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984010" version="1" comment="nodejs-full-i18n is &lt;22.15.0-1.module+el9.6.0+23062+9e7801b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984011" version="1" comment="nodejs-libs is &lt;22.15.0-1.module+el9.6.0+23062+9e7801b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984012" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.6.0+23062+9e7801b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984013" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.6.0+23062+9e7801b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984014" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.6.0+23062+9e7801b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984015" version="1" comment="npm is &lt;10.9.2-1.22.15.0.1.module+el9.6.0+23062+9e7801b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984016" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.15.0.1.module+el9.6.0+23062+9e7801b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984017" version="1" comment="thunderbird is &lt;128.10.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984018" version="1" comment="libsoup is &lt;2.72.0-10.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984019" version="1" comment="libsoup-devel is &lt;2.72.0-10.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984020" version="1" comment="avahi is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984021" version="1" comment="avahi-autoipd is &lt;0.8-22.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984022" version="1" comment="avahi-compat-howl is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984023" version="1" comment="avahi-compat-howl-devel is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984024" version="1" comment="avahi-compat-libdns_sd is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984025" version="1" comment="avahi-compat-libdns_sd-devel is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984026" version="1" comment="avahi-devel is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984027" version="1" comment="avahi-glib is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984028" version="1" comment="avahi-glib-devel is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984029" version="1" comment="avahi-gobject is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984030" version="1" comment="avahi-gobject-devel is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984031" version="1" comment="avahi-libs is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984032" version="1" comment="avahi-tools is &lt;0.8-22.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984033" version="1" comment="redis is &lt;6.2.18-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984034" version="1" comment="redis-devel is &lt;6.2.18-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984035" version="1" comment="redis-doc is &lt;6.2.18-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984036" version="1" comment="vim-X11 is &lt;8.2.2637-22.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984037" version="1" comment="vim-common is &lt;8.2.2637-22.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984038" version="1" comment="vim-enhanced is &lt;8.2.2637-22.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984039" version="1" comment="vim-filesystem is &lt;8.2.2637-22.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984040" version="1" comment="vim-minimal is &lt;8.2.2637-22.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984041" version="1" comment="expat is &lt;2.5.0-5.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984042" version="1" comment="expat-devel is &lt;2.5.0-5.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985444" version="1" comment="ghostscript is &lt;9.54.0-19.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985445" version="1" comment="ghostscript-doc is &lt;9.54.0-19.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985446" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-19.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985447" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-19.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985448" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-19.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985449" version="1" comment="ghostscript-x11 is &lt;9.54.0-19.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985450" version="1" comment="libgs is &lt;9.54.0-19.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985451" version="1" comment="libgs-devel is &lt;9.54.0-19.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984043" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984044" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984045" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984046" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984047" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984048" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984049" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984050" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.116-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984051" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.116-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984052" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.116-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984053" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984054" version="1" comment="dotnet-templates-8.0 is &lt;8.0.116-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985452" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985453" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985454" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985455" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985456" version="1" comment="dotnet-host is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985457" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985458" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985459" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985460" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.106-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985461" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.106-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985462" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.106-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985463" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.106-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985464" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985465" version="1" comment="dotnet-templates-9.0 is &lt;9.0.106-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985466" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.106-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985467" version="1" comment="xdg-utils is &lt;1.1.3-13.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985468" version="1" comment="grafana is &lt;10.2.6-13.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985469" version="1" comment="grafana-selinux is &lt;10.2.6-13.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985610" version="1" comment="kernel is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985611" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.17.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985612" version="1" comment="kernel-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985613" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985614" version="1" comment="kernel-debug is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985615" version="1" comment="kernel-debug-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985618" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985619" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985620" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985621" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985624" version="1" comment="kernel-doc is &lt;5.14.0-570.17.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985625" version="1" comment="kernel-headers is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985626" version="1" comment="kernel-modules is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985627" version="1" comment="kernel-modules-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985628" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985629" version="1" comment="kernel-rt is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985630" version="1" comment="kernel-rt-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985631" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985632" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985634" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985635" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985636" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985637" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985639" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985640" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985641" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985642" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985643" version="1" comment="kernel-tools is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985644" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985646" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985647" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985648" version="1" comment="libperf is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985649" version="1" comment="perf is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985650" version="1" comment="python3-perf is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985651" version="1" comment="rtla is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985652" version="1" comment="rv is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984055" version="1" comment="compat-openssl11 is &lt;1.1.1k-5.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985470" version="1" comment="webkit2gtk3 is &lt;2.48.2-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985471" version="1" comment="webkit2gtk3-devel is &lt;2.48.2-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985472" version="1" comment="webkit2gtk3-jsc is &lt;2.48.2-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985473" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.48.2-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985474" version="1" comment="firefox is &lt;128.10.1-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985475" version="1" comment="firefox-x11 is &lt;128.10.1-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984056" version="1" comment="libsoup is &lt;2.72.0-10.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984057" version="1" comment="libsoup-devel is &lt;2.72.0-10.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985476" version="1" comment="python3-tornado is &lt;6.4.2-2.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985653" version="1" comment="kernel is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985654" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.18.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985655" version="1" comment="kernel-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985656" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985657" version="1" comment="kernel-debug is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985658" version="1" comment="kernel-debug-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985661" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985662" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985663" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985664" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985667" version="1" comment="kernel-doc is &lt;5.14.0-570.18.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985668" version="1" comment="kernel-headers is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985669" version="1" comment="kernel-modules is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985670" version="1" comment="kernel-modules-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985671" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985672" version="1" comment="kernel-rt is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985673" version="1" comment="kernel-rt-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985674" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985675" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985677" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985678" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985679" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985680" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985682" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985683" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985684" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985685" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985686" version="1" comment="kernel-tools is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985687" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985689" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985690" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985691" version="1" comment="libperf is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985692" version="1" comment="perf is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985693" version="1" comment="python3-perf is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985694" version="1" comment="rtla is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985695" version="1" comment="rv is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985477" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.22.12-4.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985478" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.22.12-4.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985479" version="1" comment="gstreamer1-plugins-bad-free-libs is &lt;1.22.12-4.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985480" version="1" comment="python3-unbound is &lt;1.16.2-18.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985481" version="1" comment="unbound is &lt;1.16.2-18.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985482" version="1" comment="unbound-devel is &lt;1.16.2-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985483" version="1" comment="unbound-dracut is &lt;1.16.2-18.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985484" version="1" comment="unbound-libs is &lt;1.16.2-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985485" version="1" comment="thunderbird is &lt;128.10.1-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985486" version="1" comment="firefox is &lt;128.11.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985487" version="1" comment="firefox-x11 is &lt;128.11.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985978" version="1" comment="kernel is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985979" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.19.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985980" version="1" comment="kernel-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985981" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985982" version="1" comment="kernel-debug is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985983" version="1" comment="kernel-debug-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985986" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985987" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985988" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985989" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985992" version="1" comment="kernel-doc is &lt;5.14.0-570.19.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985993" version="1" comment="kernel-headers is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985994" version="1" comment="kernel-modules is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985995" version="1" comment="kernel-modules-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985996" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985997" version="1" comment="kernel-rt is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985998" version="1" comment="kernel-rt-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985999" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986000" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986002" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986003" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986004" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986005" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986007" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986008" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986009" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986010" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986011" version="1" comment="kernel-tools is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986012" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986014" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986015" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986016" version="1" comment="libperf is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986017" version="1" comment="perf is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986018" version="1" comment="python3-perf is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986019" version="1" comment="rtla is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986020" version="1" comment="rv is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985818" version="1" comment="varnish is &lt;6.6.2-6.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985819" version="1" comment="varnish-devel is &lt;6.6.2-6.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985820" version="1" comment="varnish-docs is &lt;6.6.2-6.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986177" version="1" comment="nodejs is &lt;22.16.0-1.module+el9.6.0+23151+b1496e9d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986178" version="1" comment="nodejs-devel is &lt;22.16.0-1.module+el9.6.0+23151+b1496e9d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986179" version="1" comment="nodejs-docs is &lt;22.16.0-1.module+el9.6.0+23151+b1496e9d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986180" version="1" comment="nodejs-full-i18n is &lt;22.16.0-1.module+el9.6.0+23151+b1496e9d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986181" version="1" comment="nodejs-libs is &lt;22.16.0-1.module+el9.6.0+23151+b1496e9d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986182" version="1" comment="npm is &lt;10.9.2-1.22.16.0.1.module+el9.6.0+23151+b1496e9d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986183" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.16.0.1.module+el9.6.0+23151+b1496e9d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986184" version="1" comment="nodejs is &lt;20.19.2-1.module+el9.6.0+23146+be9976bd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986185" version="1" comment="nodejs-devel is &lt;20.19.2-1.module+el9.6.0+23146+be9976bd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986186" version="1" comment="nodejs-docs is &lt;20.19.2-1.module+el9.6.0+23146+be9976bd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986187" version="1" comment="nodejs-full-i18n is &lt;20.19.2-1.module+el9.6.0+23146+be9976bd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986188" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.6.0+23146+be9976bd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986189" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.6.0+23146+be9976bd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986190" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.6.0+23146+be9976bd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986191" version="1" comment="npm is &lt;10.8.2-1.20.19.2.1.module+el9.6.0+23146+be9976bd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986021" version="1" comment="go-toolset is &lt;1.23.9-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986022" version="1" comment="golang is &lt;1.23.9-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986023" version="1" comment="golang-bin is &lt;1.23.9-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986024" version="1" comment="golang-docs is &lt;1.23.9-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986025" version="1" comment="golang-misc is &lt;1.23.9-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986026" version="1" comment="golang-race is &lt;1.23.9-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986027" version="1" comment="golang-src is &lt;1.23.9-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986028" version="1" comment="golang-tests is &lt;1.23.9-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986192" version="1" comment="thunderbird is &lt;128.11.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986193" version="1" comment="perl-FCGI is &lt;0.79-8.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986194" version="1" comment="kernel is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986195" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.21.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986196" version="1" comment="kernel-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986197" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986198" version="1" comment="kernel-debug is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986199" version="1" comment="kernel-debug-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986202" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986203" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986204" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986205" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986208" version="1" comment="kernel-doc is &lt;5.14.0-570.21.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986209" version="1" comment="kernel-headers is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986210" version="1" comment="kernel-modules is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986211" version="1" comment="kernel-modules-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986212" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986213" version="1" comment="kernel-rt is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986214" version="1" comment="kernel-rt-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986215" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986216" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986218" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986219" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986220" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986221" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986223" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986224" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986225" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986226" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986227" version="1" comment="kernel-tools is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986228" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986230" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986231" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986232" version="1" comment="libperf is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986233" version="1" comment="perf is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986234" version="1" comment="python3-perf is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986235" version="1" comment="rtla is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986236" version="1" comment="rv is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986311" version="1" comment="glibc is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986312" version="1" comment="glibc-all-langpacks is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986313" version="1" comment="glibc-benchtests is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986314" version="1" comment="glibc-common is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986315" version="1" comment="glibc-devel is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986316" version="1" comment="glibc-doc is &lt;2.34-168.el9_6.19 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986317" version="1" comment="glibc-gconv-extra is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986318" version="1" comment="glibc-headers is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986319" version="1" comment="glibc-langpack-aa is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986320" version="1" comment="glibc-langpack-af is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986321" version="1" comment="glibc-langpack-agr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986322" version="1" comment="glibc-langpack-ak is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986323" version="1" comment="glibc-langpack-am is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986324" version="1" comment="glibc-langpack-an is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986325" version="1" comment="glibc-langpack-anp is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986326" version="1" comment="glibc-langpack-ar is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986327" version="1" comment="glibc-langpack-as is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986328" version="1" comment="glibc-langpack-ast is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986329" version="1" comment="glibc-langpack-ayc is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986330" version="1" comment="glibc-langpack-az is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986331" version="1" comment="glibc-langpack-be is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986332" version="1" comment="glibc-langpack-bem is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986333" version="1" comment="glibc-langpack-ber is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986334" version="1" comment="glibc-langpack-bg is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986335" version="1" comment="glibc-langpack-bhb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986336" version="1" comment="glibc-langpack-bho is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986337" version="1" comment="glibc-langpack-bi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986338" version="1" comment="glibc-langpack-bn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986339" version="1" comment="glibc-langpack-bo is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986340" version="1" comment="glibc-langpack-br is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986341" version="1" comment="glibc-langpack-brx is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986342" version="1" comment="glibc-langpack-bs is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986343" version="1" comment="glibc-langpack-byn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986344" version="1" comment="glibc-langpack-ca is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986345" version="1" comment="glibc-langpack-ce is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986346" version="1" comment="glibc-langpack-chr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986347" version="1" comment="glibc-langpack-ckb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986348" version="1" comment="glibc-langpack-cmn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986349" version="1" comment="glibc-langpack-crh is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986350" version="1" comment="glibc-langpack-cs is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986351" version="1" comment="glibc-langpack-csb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986352" version="1" comment="glibc-langpack-cv is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986353" version="1" comment="glibc-langpack-cy is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986354" version="1" comment="glibc-langpack-da is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986355" version="1" comment="glibc-langpack-de is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986356" version="1" comment="glibc-langpack-doi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986357" version="1" comment="glibc-langpack-dsb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986358" version="1" comment="glibc-langpack-dv is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986359" version="1" comment="glibc-langpack-dz is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986360" version="1" comment="glibc-langpack-el is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986361" version="1" comment="glibc-langpack-en is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986362" version="1" comment="glibc-langpack-eo is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986363" version="1" comment="glibc-langpack-es is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986364" version="1" comment="glibc-langpack-et is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986365" version="1" comment="glibc-langpack-eu is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986366" version="1" comment="glibc-langpack-fa is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986367" version="1" comment="glibc-langpack-ff is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986368" version="1" comment="glibc-langpack-fi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986369" version="1" comment="glibc-langpack-fil is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986370" version="1" comment="glibc-langpack-fo is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986371" version="1" comment="glibc-langpack-fr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986372" version="1" comment="glibc-langpack-fur is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986373" version="1" comment="glibc-langpack-fy is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986374" version="1" comment="glibc-langpack-ga is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986375" version="1" comment="glibc-langpack-gd is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986376" version="1" comment="glibc-langpack-gez is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986377" version="1" comment="glibc-langpack-gl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986378" version="1" comment="glibc-langpack-gu is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986379" version="1" comment="glibc-langpack-gv is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986380" version="1" comment="glibc-langpack-ha is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986381" version="1" comment="glibc-langpack-hak is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986382" version="1" comment="glibc-langpack-he is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986383" version="1" comment="glibc-langpack-hi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986384" version="1" comment="glibc-langpack-hif is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986385" version="1" comment="glibc-langpack-hne is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986386" version="1" comment="glibc-langpack-hr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986387" version="1" comment="glibc-langpack-hsb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986388" version="1" comment="glibc-langpack-ht is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986389" version="1" comment="glibc-langpack-hu is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986390" version="1" comment="glibc-langpack-hy is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986391" version="1" comment="glibc-langpack-ia is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986392" version="1" comment="glibc-langpack-id is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986393" version="1" comment="glibc-langpack-ig is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986394" version="1" comment="glibc-langpack-ik is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986395" version="1" comment="glibc-langpack-is is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986396" version="1" comment="glibc-langpack-it is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986397" version="1" comment="glibc-langpack-iu is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986398" version="1" comment="glibc-langpack-ja is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986399" version="1" comment="glibc-langpack-ka is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986400" version="1" comment="glibc-langpack-kab is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986401" version="1" comment="glibc-langpack-kk is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986402" version="1" comment="glibc-langpack-kl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986403" version="1" comment="glibc-langpack-km is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986404" version="1" comment="glibc-langpack-kn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986405" version="1" comment="glibc-langpack-ko is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986406" version="1" comment="glibc-langpack-kok is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986407" version="1" comment="glibc-langpack-ks is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986408" version="1" comment="glibc-langpack-ku is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986409" version="1" comment="glibc-langpack-kw is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986410" version="1" comment="glibc-langpack-ky is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986411" version="1" comment="glibc-langpack-lb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986412" version="1" comment="glibc-langpack-lg is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986413" version="1" comment="glibc-langpack-li is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986414" version="1" comment="glibc-langpack-lij is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986415" version="1" comment="glibc-langpack-ln is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986416" version="1" comment="glibc-langpack-lo is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986417" version="1" comment="glibc-langpack-lt is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986418" version="1" comment="glibc-langpack-lv is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986419" version="1" comment="glibc-langpack-lzh is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986420" version="1" comment="glibc-langpack-mag is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986421" version="1" comment="glibc-langpack-mai is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986422" version="1" comment="glibc-langpack-mfe is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986423" version="1" comment="glibc-langpack-mg is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986424" version="1" comment="glibc-langpack-mhr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986425" version="1" comment="glibc-langpack-mi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986426" version="1" comment="glibc-langpack-miq is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986427" version="1" comment="glibc-langpack-mjw is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986428" version="1" comment="glibc-langpack-mk is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986429" version="1" comment="glibc-langpack-ml is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986430" version="1" comment="glibc-langpack-mn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986431" version="1" comment="glibc-langpack-mni is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986432" version="1" comment="glibc-langpack-mnw is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986433" version="1" comment="glibc-langpack-mr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986434" version="1" comment="glibc-langpack-ms is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986435" version="1" comment="glibc-langpack-mt is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986436" version="1" comment="glibc-langpack-my is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986437" version="1" comment="glibc-langpack-nan is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986438" version="1" comment="glibc-langpack-nb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986439" version="1" comment="glibc-langpack-nds is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986440" version="1" comment="glibc-langpack-ne is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986441" version="1" comment="glibc-langpack-nhn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986442" version="1" comment="glibc-langpack-niu is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986443" version="1" comment="glibc-langpack-nl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986444" version="1" comment="glibc-langpack-nn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986445" version="1" comment="glibc-langpack-nr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986446" version="1" comment="glibc-langpack-nso is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986447" version="1" comment="glibc-langpack-oc is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986448" version="1" comment="glibc-langpack-om is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986449" version="1" comment="glibc-langpack-or is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986450" version="1" comment="glibc-langpack-os is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986451" version="1" comment="glibc-langpack-pa is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986452" version="1" comment="glibc-langpack-pap is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986453" version="1" comment="glibc-langpack-pl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986454" version="1" comment="glibc-langpack-ps is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986455" version="1" comment="glibc-langpack-pt is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986456" version="1" comment="glibc-langpack-quz is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986457" version="1" comment="glibc-langpack-raj is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986458" version="1" comment="glibc-langpack-ro is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986459" version="1" comment="glibc-langpack-ru is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986460" version="1" comment="glibc-langpack-rw is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986461" version="1" comment="glibc-langpack-sa is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986462" version="1" comment="glibc-langpack-sah is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986463" version="1" comment="glibc-langpack-sat is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986464" version="1" comment="glibc-langpack-sc is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986465" version="1" comment="glibc-langpack-sd is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986466" version="1" comment="glibc-langpack-se is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986467" version="1" comment="glibc-langpack-sgs is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986468" version="1" comment="glibc-langpack-shn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986469" version="1" comment="glibc-langpack-shs is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986470" version="1" comment="glibc-langpack-si is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986471" version="1" comment="glibc-langpack-sid is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986472" version="1" comment="glibc-langpack-sk is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986473" version="1" comment="glibc-langpack-sl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986474" version="1" comment="glibc-langpack-sm is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986475" version="1" comment="glibc-langpack-so is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986476" version="1" comment="glibc-langpack-sq is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986477" version="1" comment="glibc-langpack-sr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986478" version="1" comment="glibc-langpack-ss is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986479" version="1" comment="glibc-langpack-st is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986480" version="1" comment="glibc-langpack-sv is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986481" version="1" comment="glibc-langpack-sw is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986482" version="1" comment="glibc-langpack-szl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986483" version="1" comment="glibc-langpack-ta is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986484" version="1" comment="glibc-langpack-tcy is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986485" version="1" comment="glibc-langpack-te is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986486" version="1" comment="glibc-langpack-tg is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986487" version="1" comment="glibc-langpack-th is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986488" version="1" comment="glibc-langpack-the is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986489" version="1" comment="glibc-langpack-ti is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986490" version="1" comment="glibc-langpack-tig is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986491" version="1" comment="glibc-langpack-tk is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986492" version="1" comment="glibc-langpack-tl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986493" version="1" comment="glibc-langpack-tn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986494" version="1" comment="glibc-langpack-to is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986495" version="1" comment="glibc-langpack-tpi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986496" version="1" comment="glibc-langpack-tr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986497" version="1" comment="glibc-langpack-ts is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986498" version="1" comment="glibc-langpack-tt is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986499" version="1" comment="glibc-langpack-ug is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986500" version="1" comment="glibc-langpack-uk is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986501" version="1" comment="glibc-langpack-unm is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986502" version="1" comment="glibc-langpack-ur is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986503" version="1" comment="glibc-langpack-uz is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986504" version="1" comment="glibc-langpack-ve is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986505" version="1" comment="glibc-langpack-vi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986506" version="1" comment="glibc-langpack-wa is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986507" version="1" comment="glibc-langpack-wae is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986508" version="1" comment="glibc-langpack-wal is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986509" version="1" comment="glibc-langpack-wo is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986510" version="1" comment="glibc-langpack-xh is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986511" version="1" comment="glibc-langpack-yi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986512" version="1" comment="glibc-langpack-yo is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986513" version="1" comment="glibc-langpack-yue is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986514" version="1" comment="glibc-langpack-yuw is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986515" version="1" comment="glibc-langpack-zh is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986516" version="1" comment="glibc-langpack-zu is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986517" version="1" comment="glibc-locale-source is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986518" version="1" comment="glibc-minimal-langpack is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986519" version="1" comment="glibc-nss-devel is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986520" version="1" comment="glibc-static is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986521" version="1" comment="glibc-utils is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986522" version="1" comment="libnsl is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986523" version="1" comment="nscd is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986524" version="1" comment="nss_db is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986525" version="1" comment="nss_hesiod is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986652" version="1" comment="grafana is &lt;10.2.6-14.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986653" version="1" comment="grafana-selinux is &lt;10.2.6-14.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986654" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986655" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986656" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986657" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986658" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986659" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986660" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986661" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.117-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986662" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.117-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986663" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.117-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986664" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986665" version="1" comment="dotnet-templates-8.0 is &lt;8.0.117-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986666" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986667" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986668" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986669" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986670" version="1" comment="dotnet-host is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986671" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986672" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986673" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986674" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.107-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986675" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.107-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986676" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.107-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986677" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.107-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986678" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986679" version="1" comment="dotnet-templates-9.0 is &lt;9.0.107-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986680" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.107-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986681" version="1" comment="mod_security is &lt;2.9.6-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986682" version="1" comment="mod_security-mlogc is &lt;2.9.6-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986971" version="1" comment="grafana-pcp is &lt;5.1.1-11.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986972" version="1" comment="kernel is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986973" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.22.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986974" version="1" comment="kernel-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986975" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986976" version="1" comment="kernel-debug is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986977" version="1" comment="kernel-debug-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986980" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986981" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986982" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986983" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986986" version="1" comment="kernel-doc is &lt;5.14.0-570.22.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986987" version="1" comment="kernel-headers is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986988" version="1" comment="kernel-modules is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986989" version="1" comment="kernel-modules-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986990" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986991" version="1" comment="kernel-rt is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986992" version="1" comment="kernel-rt-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986993" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986994" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986996" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986997" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986998" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986999" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987001" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987002" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987003" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987004" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987005" version="1" comment="kernel-tools is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987006" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987008" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987009" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987010" version="1" comment="libperf is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987011" version="1" comment="perf is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987012" version="1" comment="python3-perf is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987013" version="1" comment="rtla is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987014" version="1" comment="rv is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987015" version="1" comment="git-lfs is &lt;3.6.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987016" version="1" comment="apache-commons-beanutils is &lt;1.9.4-10.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987017" version="1" comment="libvpx is &lt;1.9.0-9.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987018" version="1" comment="libvpx-devel is &lt;1.9.0-9.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986868" version="1" comment="containernetworking-plugins is &lt;1.6.2-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986869" version="1" comment="podman is &lt;5.4.0-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986870" version="1" comment="podman-docker is &lt;5.4.0-10.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986871" version="1" comment="podman-plugins is &lt;5.4.0-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986872" version="1" comment="podman-remote is &lt;5.4.0-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986873" version="1" comment="podman-tests is &lt;5.4.0-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986874" version="1" comment="skopeo is &lt;1.18.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986875" version="1" comment="skopeo-tests is &lt;1.18.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986876" version="1" comment="buildah is &lt;1.39.4-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986877" version="1" comment="buildah-tests is &lt;1.39.4-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986878" version="1" comment="gvisor-tap-vsock is &lt;0.8.5-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986879" version="1" comment="gvisor-tap-vsock-gvforwarder is &lt;0.8.5-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987305" version="1" comment="gimp is &lt;2.99.8-4.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987306" version="1" comment="gimp-libs is &lt;2.99.8-4.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987307" version="1" comment="ipa-client is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987308" version="1" comment="ipa-client-common is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987309" version="1" comment="ipa-client-encrypted-dns is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987310" version="1" comment="ipa-client-epn is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987311" version="1" comment="ipa-client-samba is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987312" version="1" comment="ipa-common is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987313" version="1" comment="ipa-selinux is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987314" version="1" comment="ipa-selinux-luna is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987315" version="1" comment="ipa-selinux-nfast is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987316" version="1" comment="ipa-server is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987317" version="1" comment="ipa-server-common is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987318" version="1" comment="ipa-server-dns is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987319" version="1" comment="ipa-server-encrypted-dns is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987320" version="1" comment="ipa-server-trust-ad is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987321" version="1" comment="python3-ipaclient is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987322" version="1" comment="python3-ipalib is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987323" version="1" comment="python3-ipaserver is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987324" version="1" comment="python3-ipatests is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996844" version="1" comment="kernel is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996845" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.23.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996846" version="1" comment="kernel-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996847" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996848" version="1" comment="kernel-debug is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996849" version="1" comment="kernel-debug-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996852" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996853" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996854" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996855" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996858" version="1" comment="kernel-doc is &lt;5.14.0-570.23.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996859" version="1" comment="kernel-headers is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996860" version="1" comment="kernel-modules is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996861" version="1" comment="kernel-modules-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996862" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996863" version="1" comment="kernel-rt is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996864" version="1" comment="kernel-rt-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996865" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996866" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996868" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996869" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996870" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996871" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996873" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996874" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996875" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996876" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996877" version="1" comment="kernel-tools is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996878" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996880" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996881" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996882" version="1" comment="libperf is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996883" version="1" comment="perf is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996884" version="1" comment="python3-perf is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996885" version="1" comment="rtla is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996886" version="1" comment="rv is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996887" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-31.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996888" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-31.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996889" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-31.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996890" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-31.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996891" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-31.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996892" version="1" comment="xorg-x11-server-Xwayland is &lt;23.2.7-4.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996893" version="1" comment="xorg-x11-server-Xwayland-devel is &lt;23.2.7-4.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996894" version="1" comment="xorg-x11-server-common is &lt;1.20.11-31.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996895" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-31.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996896" version="1" comment="xorg-x11-server-source is &lt;1.20.11-31.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996897" version="1" comment="tigervnc is &lt;1.14.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996898" version="1" comment="tigervnc-icons is &lt;1.14.1-8.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996899" version="1" comment="tigervnc-license is &lt;1.14.1-8.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996900" version="1" comment="tigervnc-selinux is &lt;1.14.1-8.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996901" version="1" comment="tigervnc-server is &lt;1.14.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996902" version="1" comment="tigervnc-server-minimal is &lt;1.14.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996903" version="1" comment="tigervnc-server-module is &lt;1.14.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996904" version="1" comment="libblockdev is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996905" version="1" comment="libblockdev-crypto is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996906" version="1" comment="libblockdev-dm is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996907" version="1" comment="libblockdev-fs is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996908" version="1" comment="libblockdev-kbd is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996909" version="1" comment="libblockdev-loop is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996910" version="1" comment="libblockdev-lvm is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996911" version="1" comment="libblockdev-lvm-dbus is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996912" version="1" comment="libblockdev-mdraid is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996913" version="1" comment="libblockdev-mpath is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996914" version="1" comment="libblockdev-nvdimm is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996915" version="1" comment="libblockdev-nvme is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996916" version="1" comment="libblockdev-part is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996917" version="1" comment="libblockdev-plugins-all is &lt;2.28-14.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996918" version="1" comment="libblockdev-swap is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996919" version="1" comment="libblockdev-tools is &lt;2.28-14.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996920" version="1" comment="libblockdev-utils is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996921" version="1" comment="python3-blockdev is &lt;2.28-14.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996922" version="1" comment="perl-YAML-LibYAML is &lt;0.82-6.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996923" version="1" comment="mod_auth_openidc is &lt;2.4.10-1.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996924" version="1" comment="krb5-devel is &lt;1.21.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996925" version="1" comment="krb5-libs is &lt;1.21.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996926" version="1" comment="krb5-pkinit is &lt;1.21.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996927" version="1" comment="krb5-server is &lt;1.21.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996928" version="1" comment="krb5-server-ldap is &lt;1.21.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996929" version="1" comment="krb5-workstation is &lt;1.21.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996930" version="1" comment="libkadm5 is &lt;1.21.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996931" version="1" comment="bsdtar is &lt;3.5.3-5.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996932" version="1" comment="libarchive is &lt;3.5.3-5.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996933" version="1" comment="libarchive-devel is &lt;3.5.3-5.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996934" version="1" comment="iputils is &lt;20210202-11.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996935" version="1" comment="iputils-ninfod is &lt;20210202-11.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996936" version="1" comment="mod_proxy_cluster is &lt;1.3.22-1.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996937" version="1" comment="emacs is &lt;27.2-14.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996938" version="1" comment="emacs-common is &lt;27.2-14.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996939" version="1" comment="emacs-filesystem is &lt;27.2-14.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996940" version="1" comment="emacs-lucid is &lt;27.2-14.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996941" version="1" comment="emacs-nox is &lt;27.2-14.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996942" version="1" comment="qt5-qtbase is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996943" version="1" comment="qt5-qtbase-common is &lt;5.15.9-11.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996944" version="1" comment="qt5-qtbase-devel is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996945" version="1" comment="qt5-qtbase-examples is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996946" version="1" comment="qt5-qtbase-gui is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996947" version="1" comment="qt5-qtbase-mysql is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996948" version="1" comment="qt5-qtbase-odbc is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996949" version="1" comment="qt5-qtbase-postgresql is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996950" version="1" comment="qt5-qtbase-private-devel is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996951" version="1" comment="qt5-qtbase-static is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997705" version="1" comment="perl-File-Find-Rule is &lt;0.34-19.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997706" version="1" comment="pam is &lt;1.5.1-25.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997707" version="1" comment="pam-devel is &lt;1.5.1-25.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997708" version="1" comment="pam-docs is &lt;1.5.1-25.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997709" version="1" comment="weldr-client is &lt;35.12-4.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997710" version="1" comment="glibc is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997711" version="1" comment="glibc-all-langpacks is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997712" version="1" comment="glibc-benchtests is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997713" version="1" comment="glibc-common is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997714" version="1" comment="glibc-devel is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997715" version="1" comment="glibc-doc is &lt;2.34-168.el9_6.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997716" version="1" comment="glibc-gconv-extra is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997717" version="1" comment="glibc-headers is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997718" version="1" comment="glibc-langpack-aa is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997719" version="1" comment="glibc-langpack-af is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997720" version="1" comment="glibc-langpack-agr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997721" version="1" comment="glibc-langpack-ak is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997722" version="1" comment="glibc-langpack-am is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997723" version="1" comment="glibc-langpack-an is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997724" version="1" comment="glibc-langpack-anp is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997725" version="1" comment="glibc-langpack-ar is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997726" version="1" comment="glibc-langpack-as is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997727" version="1" comment="glibc-langpack-ast is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997728" version="1" comment="glibc-langpack-ayc is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997729" version="1" comment="glibc-langpack-az is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997730" version="1" comment="glibc-langpack-be is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997731" version="1" comment="glibc-langpack-bem is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997732" version="1" comment="glibc-langpack-ber is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997733" version="1" comment="glibc-langpack-bg is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997734" version="1" comment="glibc-langpack-bhb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997735" version="1" comment="glibc-langpack-bho is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997736" version="1" comment="glibc-langpack-bi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997737" version="1" comment="glibc-langpack-bn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997738" version="1" comment="glibc-langpack-bo is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997739" version="1" comment="glibc-langpack-br is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997740" version="1" comment="glibc-langpack-brx is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997741" version="1" comment="glibc-langpack-bs is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997742" version="1" comment="glibc-langpack-byn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997743" version="1" comment="glibc-langpack-ca is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997744" version="1" comment="glibc-langpack-ce is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997745" version="1" comment="glibc-langpack-chr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997746" version="1" comment="glibc-langpack-ckb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997747" version="1" comment="glibc-langpack-cmn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997748" version="1" comment="glibc-langpack-crh is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997749" version="1" comment="glibc-langpack-cs is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997750" version="1" comment="glibc-langpack-csb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997751" version="1" comment="glibc-langpack-cv is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997752" version="1" comment="glibc-langpack-cy is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997753" version="1" comment="glibc-langpack-da is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997754" version="1" comment="glibc-langpack-de is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997755" version="1" comment="glibc-langpack-doi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997756" version="1" comment="glibc-langpack-dsb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997757" version="1" comment="glibc-langpack-dv is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997758" version="1" comment="glibc-langpack-dz is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997759" version="1" comment="glibc-langpack-el is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997760" version="1" comment="glibc-langpack-en is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997761" version="1" comment="glibc-langpack-eo is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997762" version="1" comment="glibc-langpack-es is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997763" version="1" comment="glibc-langpack-et is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997764" version="1" comment="glibc-langpack-eu is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997765" version="1" comment="glibc-langpack-fa is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997766" version="1" comment="glibc-langpack-ff is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997767" version="1" comment="glibc-langpack-fi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997768" version="1" comment="glibc-langpack-fil is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997769" version="1" comment="glibc-langpack-fo is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997770" version="1" comment="glibc-langpack-fr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997771" version="1" comment="glibc-langpack-fur is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997772" version="1" comment="glibc-langpack-fy is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997773" version="1" comment="glibc-langpack-ga is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997774" version="1" comment="glibc-langpack-gd is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997775" version="1" comment="glibc-langpack-gez is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997776" version="1" comment="glibc-langpack-gl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997777" version="1" comment="glibc-langpack-gu is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997778" version="1" comment="glibc-langpack-gv is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997779" version="1" comment="glibc-langpack-ha is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997780" version="1" comment="glibc-langpack-hak is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997781" version="1" comment="glibc-langpack-he is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997782" version="1" comment="glibc-langpack-hi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997783" version="1" comment="glibc-langpack-hif is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997784" version="1" comment="glibc-langpack-hne is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997785" version="1" comment="glibc-langpack-hr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997786" version="1" comment="glibc-langpack-hsb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997787" version="1" comment="glibc-langpack-ht is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997788" version="1" comment="glibc-langpack-hu is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997789" version="1" comment="glibc-langpack-hy is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997790" version="1" comment="glibc-langpack-ia is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997791" version="1" comment="glibc-langpack-id is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997792" version="1" comment="glibc-langpack-ig is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997793" version="1" comment="glibc-langpack-ik is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997794" version="1" comment="glibc-langpack-is is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997795" version="1" comment="glibc-langpack-it is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997796" version="1" comment="glibc-langpack-iu is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997797" version="1" comment="glibc-langpack-ja is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997798" version="1" comment="glibc-langpack-ka is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997799" version="1" comment="glibc-langpack-kab is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997800" version="1" comment="glibc-langpack-kk is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997801" version="1" comment="glibc-langpack-kl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997802" version="1" comment="glibc-langpack-km is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997803" version="1" comment="glibc-langpack-kn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997804" version="1" comment="glibc-langpack-ko is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997805" version="1" comment="glibc-langpack-kok is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997806" version="1" comment="glibc-langpack-ks is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997807" version="1" comment="glibc-langpack-ku is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997808" version="1" comment="glibc-langpack-kw is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997809" version="1" comment="glibc-langpack-ky is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997810" version="1" comment="glibc-langpack-lb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997811" version="1" comment="glibc-langpack-lg is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997812" version="1" comment="glibc-langpack-li is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997813" version="1" comment="glibc-langpack-lij is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997814" version="1" comment="glibc-langpack-ln is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997815" version="1" comment="glibc-langpack-lo is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997816" version="1" comment="glibc-langpack-lt is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997817" version="1" comment="glibc-langpack-lv is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997818" version="1" comment="glibc-langpack-lzh is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997819" version="1" comment="glibc-langpack-mag is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997820" version="1" comment="glibc-langpack-mai is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997821" version="1" comment="glibc-langpack-mfe is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997822" version="1" comment="glibc-langpack-mg is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997823" version="1" comment="glibc-langpack-mhr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997824" version="1" comment="glibc-langpack-mi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997825" version="1" comment="glibc-langpack-miq is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997826" version="1" comment="glibc-langpack-mjw is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997827" version="1" comment="glibc-langpack-mk is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997828" version="1" comment="glibc-langpack-ml is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997829" version="1" comment="glibc-langpack-mn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997830" version="1" comment="glibc-langpack-mni is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997831" version="1" comment="glibc-langpack-mnw is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997832" version="1" comment="glibc-langpack-mr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997833" version="1" comment="glibc-langpack-ms is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997834" version="1" comment="glibc-langpack-mt is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997835" version="1" comment="glibc-langpack-my is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997836" version="1" comment="glibc-langpack-nan is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997837" version="1" comment="glibc-langpack-nb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997838" version="1" comment="glibc-langpack-nds is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997839" version="1" comment="glibc-langpack-ne is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997840" version="1" comment="glibc-langpack-nhn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997841" version="1" comment="glibc-langpack-niu is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997842" version="1" comment="glibc-langpack-nl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997843" version="1" comment="glibc-langpack-nn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997844" version="1" comment="glibc-langpack-nr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997845" version="1" comment="glibc-langpack-nso is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997846" version="1" comment="glibc-langpack-oc is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997847" version="1" comment="glibc-langpack-om is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997848" version="1" comment="glibc-langpack-or is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997849" version="1" comment="glibc-langpack-os is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997850" version="1" comment="glibc-langpack-pa is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997851" version="1" comment="glibc-langpack-pap is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997852" version="1" comment="glibc-langpack-pl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997853" version="1" comment="glibc-langpack-ps is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997854" version="1" comment="glibc-langpack-pt is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997855" version="1" comment="glibc-langpack-quz is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997856" version="1" comment="glibc-langpack-raj is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997857" version="1" comment="glibc-langpack-ro is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997858" version="1" comment="glibc-langpack-ru is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997859" version="1" comment="glibc-langpack-rw is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997860" version="1" comment="glibc-langpack-sa is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997861" version="1" comment="glibc-langpack-sah is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997862" version="1" comment="glibc-langpack-sat is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997863" version="1" comment="glibc-langpack-sc is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997864" version="1" comment="glibc-langpack-sd is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997865" version="1" comment="glibc-langpack-se is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997866" version="1" comment="glibc-langpack-sgs is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997867" version="1" comment="glibc-langpack-shn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997868" version="1" comment="glibc-langpack-shs is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997869" version="1" comment="glibc-langpack-si is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997870" version="1" comment="glibc-langpack-sid is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997871" version="1" comment="glibc-langpack-sk is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997872" version="1" comment="glibc-langpack-sl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997873" version="1" comment="glibc-langpack-sm is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997874" version="1" comment="glibc-langpack-so is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997875" version="1" comment="glibc-langpack-sq is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997876" version="1" comment="glibc-langpack-sr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997877" version="1" comment="glibc-langpack-ss is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997878" version="1" comment="glibc-langpack-st is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997879" version="1" comment="glibc-langpack-sv is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997880" version="1" comment="glibc-langpack-sw is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997881" version="1" comment="glibc-langpack-szl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997882" version="1" comment="glibc-langpack-ta is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997883" version="1" comment="glibc-langpack-tcy is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997884" version="1" comment="glibc-langpack-te is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997885" version="1" comment="glibc-langpack-tg is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997886" version="1" comment="glibc-langpack-th is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997887" version="1" comment="glibc-langpack-the is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997888" version="1" comment="glibc-langpack-ti is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997889" version="1" comment="glibc-langpack-tig is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997890" version="1" comment="glibc-langpack-tk is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997891" version="1" comment="glibc-langpack-tl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997892" version="1" comment="glibc-langpack-tn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997893" version="1" comment="glibc-langpack-to is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997894" version="1" comment="glibc-langpack-tpi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997895" version="1" comment="glibc-langpack-tr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997896" version="1" comment="glibc-langpack-ts is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997897" version="1" comment="glibc-langpack-tt is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997898" version="1" comment="glibc-langpack-ug is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997899" version="1" comment="glibc-langpack-uk is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997900" version="1" comment="glibc-langpack-unm is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997901" version="1" comment="glibc-langpack-ur is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997902" version="1" comment="glibc-langpack-uz is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997903" version="1" comment="glibc-langpack-ve is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997904" version="1" comment="glibc-langpack-vi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997905" version="1" comment="glibc-langpack-wa is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997906" version="1" comment="glibc-langpack-wae is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997907" version="1" comment="glibc-langpack-wal is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997908" version="1" comment="glibc-langpack-wo is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997909" version="1" comment="glibc-langpack-xh is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997910" version="1" comment="glibc-langpack-yi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997911" version="1" comment="glibc-langpack-yo is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997912" version="1" comment="glibc-langpack-yue is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997913" version="1" comment="glibc-langpack-yuw is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997914" version="1" comment="glibc-langpack-zh is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997915" version="1" comment="glibc-langpack-zu is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997916" version="1" comment="glibc-locale-source is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997917" version="1" comment="glibc-minimal-langpack is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997918" version="1" comment="glibc-nss-devel is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997919" version="1" comment="glibc-static is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997920" version="1" comment="glibc-utils is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997921" version="1" comment="libnsl is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997922" version="1" comment="nscd is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997923" version="1" comment="nss_db is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997924" version="1" comment="nss_hesiod is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997925" version="1" comment="kernel is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997926" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.24.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997927" version="1" comment="kernel-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997928" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997929" version="1" comment="kernel-debug is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997930" version="1" comment="kernel-debug-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997933" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997934" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997935" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997936" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997939" version="1" comment="kernel-doc is &lt;5.14.0-570.24.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997940" version="1" comment="kernel-headers is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997941" version="1" comment="kernel-modules is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997942" version="1" comment="kernel-modules-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997943" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997944" version="1" comment="kernel-rt is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997945" version="1" comment="kernel-rt-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997946" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997947" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997949" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997950" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997951" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997952" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997954" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997955" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997956" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997957" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997958" version="1" comment="kernel-tools is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997959" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997961" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997962" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997963" version="1" comment="libperf is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997964" version="1" comment="perf is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997965" version="1" comment="python3-perf is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997966" version="1" comment="rtla is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997967" version="1" comment="rv is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997968" version="1" comment="sudo is &lt;1.9.5p2-10.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997969" version="1" comment="sudo-python-plugin is &lt;1.9.5p2-10.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054543" version="1" comment="gcc-toolset-14-binutils is &lt;2.41-5.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054544" version="1" comment="gcc-toolset-14-binutils-devel is &lt;2.41-5.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054545" version="1" comment="gcc-toolset-14-binutils-gold is &lt;2.41-5.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054546" version="1" comment="gcc-toolset-14-binutils-gprofng is &lt;2.41-5.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054547" version="1" comment="tar is &lt;1.34-9.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054548" version="1" comment="poppler is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054549" version="1" comment="poppler-cpp is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054550" version="1" comment="poppler-cpp-devel is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054551" version="1" comment="poppler-devel is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054552" version="1" comment="poppler-glib is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054553" version="1" comment="poppler-glib-devel is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054554" version="1" comment="poppler-glib-doc is &lt;21.01.0-23.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054555" version="1" comment="poppler-qt5 is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054556" version="1" comment="poppler-qt5-devel is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054557" version="1" comment="poppler-utils is &lt;21.01.0-23.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054558" version="1" comment="mariadb is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054559" version="1" comment="mariadb-backup is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054560" version="1" comment="mariadb-common is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054561" version="1" comment="mariadb-devel is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054562" version="1" comment="mariadb-embedded is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054563" version="1" comment="mariadb-embedded-devel is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054564" version="1" comment="mariadb-errmsg is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054565" version="1" comment="mariadb-gssapi-server is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054566" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054567" version="1" comment="mariadb-pam is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054568" version="1" comment="mariadb-server is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054569" version="1" comment="mariadb-server-galera is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054570" version="1" comment="mariadb-server-utils is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054571" version="1" comment="mariadb-test is &lt;10.5.29-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054572" version="1" comment="libpng is &lt;1.6.37-12.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054573" version="1" comment="libpng-devel is &lt;1.6.37-12.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054574" version="1" comment="mariadb is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054575" version="1" comment="mariadb-backup is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054576" version="1" comment="mariadb-common is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054577" version="1" comment="mariadb-devel is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054578" version="1" comment="mariadb-embedded is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054579" version="1" comment="mariadb-embedded-devel is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054580" version="1" comment="mariadb-errmsg is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054581" version="1" comment="mariadb-gssapi-server is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054582" version="1" comment="mariadb-oqgraph-engine is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054583" version="1" comment="mariadb-pam is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054584" version="1" comment="mariadb-server is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054585" version="1" comment="mariadb-server-galera is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054586" version="1" comment="mariadb-server-utils is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054587" version="1" comment="mariadb-test is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054588" version="1" comment="cups is &lt;2.3.3op2-34.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054589" version="1" comment="cups-client is &lt;2.3.3op2-34.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054590" version="1" comment="cups-devel is &lt;2.3.3op2-34.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054591" version="1" comment="cups-filesystem is &lt;2.3.3op2-34.el9_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054592" version="1" comment="cups-ipptool is &lt;2.3.3op2-34.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054593" version="1" comment="cups-libs is &lt;2.3.3op2-34.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054594" version="1" comment="cups-lpd is &lt;2.3.3op2-34.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054595" version="1" comment="cups-printerapp is &lt;2.3.3op2-34.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054596" version="1" comment="libsoup is &lt;2.72.0-12.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054597" version="1" comment="libsoup-devel is &lt;2.72.0-12.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054598" version="1" comment="buildah is &lt;1.41.8-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054599" version="1" comment="buildah-tests is &lt;1.41.8-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054600" version="1" comment="kernel is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054601" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.20.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054602" version="1" comment="kernel-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054603" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054604" version="1" comment="kernel-debug is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054605" version="1" comment="kernel-debug-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054606" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054607" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054608" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054609" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054610" version="1" comment="kernel-doc is &lt;5.14.0-611.20.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054611" version="1" comment="kernel-headers is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054612" version="1" comment="kernel-modules is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054613" version="1" comment="kernel-modules-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054614" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054615" version="1" comment="kernel-rt is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054616" version="1" comment="kernel-rt-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054617" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054618" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054619" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054620" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054621" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054622" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054623" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054624" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054625" version="1" comment="kernel-tools is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054626" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054627" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054628" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054629" version="1" comment="libperf is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054630" version="1" comment="perf is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054631" version="1" comment="python3-perf is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054632" version="1" comment="rtla is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054633" version="1" comment="rv is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054634" version="1" comment="libpq is &lt;13.23-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054635" version="1" comment="libpq-devel is &lt;13.23-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054636" version="1" comment="podman is &lt;5.6.0-11.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054637" version="1" comment="podman-docker is &lt;5.6.0-11.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054638" version="1" comment="podman-plugins is &lt;5.6.0-11.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054639" version="1" comment="podman-remote is &lt;5.6.0-11.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054640" version="1" comment="podman-tests is &lt;5.6.0-11.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054641" version="1" comment="postgresql is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054642" version="1" comment="postgresql-contrib is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054643" version="1" comment="postgresql-docs is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054644" version="1" comment="postgresql-plperl is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054645" version="1" comment="postgresql-plpython3 is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054646" version="1" comment="postgresql-pltcl is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054647" version="1" comment="postgresql-private-devel is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054648" version="1" comment="postgresql-private-libs is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054649" version="1" comment="postgresql-server is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054650" version="1" comment="postgresql-server-devel is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054651" version="1" comment="postgresql-static is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054652" version="1" comment="postgresql-test is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054653" version="1" comment="postgresql-test-rpm-macros is &lt;13.23-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054654" version="1" comment="postgresql-upgrade is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054655" version="1" comment="postgresql-upgrade-devel is &lt;13.23-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054656" version="1" comment="postgresql is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054657" version="1" comment="postgresql-contrib is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054658" version="1" comment="postgresql-docs is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054659" version="1" comment="postgresql-plperl is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054660" version="1" comment="postgresql-plpython3 is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054661" version="1" comment="postgresql-pltcl is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054662" version="1" comment="postgresql-private-devel is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054663" version="1" comment="postgresql-private-libs is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054664" version="1" comment="postgresql-server is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054665" version="1" comment="postgresql-server-devel is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054666" version="1" comment="postgresql-static is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054667" version="1" comment="postgresql-test is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054668" version="1" comment="postgresql-test-rpm-macros is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054669" version="1" comment="postgresql-upgrade is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054670" version="1" comment="postgresql-upgrade-devel is &lt;15.15-2.module+el9.7.0+23785+f55bffc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054671" version="1" comment="postgis is &lt;3.5.3-3.module+el9.7.0+23421+025f8139 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054672" version="1" comment="postgis-client is &lt;3.5.3-3.module+el9.7.0+23421+025f8139 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054673" version="1" comment="postgis-docs is &lt;3.5.3-3.module+el9.7.0+23421+025f8139 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054674" version="1" comment="postgis-upgrade is &lt;3.5.3-3.module+el9.7.0+23421+025f8139 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054675" version="1" comment="postgis-utils is &lt;3.5.3-3.module+el9.7.0+23421+025f8139 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054676" version="1" comment="postgresql is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054677" version="1" comment="postgresql-contrib is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054678" version="1" comment="postgresql-docs is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054679" version="1" comment="postgresql-plperl is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054680" version="1" comment="postgresql-plpython3 is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054681" version="1" comment="postgresql-pltcl is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054682" version="1" comment="postgresql-private-devel is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054683" version="1" comment="postgresql-private-libs is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054684" version="1" comment="postgresql-server is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054685" version="1" comment="postgresql-server-devel is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054686" version="1" comment="postgresql-static is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054687" version="1" comment="postgresql-test is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054688" version="1" comment="postgresql-test-rpm-macros is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054689" version="1" comment="postgresql-upgrade is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054690" version="1" comment="postgresql-upgrade-devel is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054691" version="1" comment="vsftpd is &lt;3.0.5-6.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054692" version="1" comment="firefox is &lt;140.7.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054693" version="1" comment="firefox-x11 is &lt;140.7.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054694" version="1" comment="net-snmp is &lt;5.9.1-17.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054695" version="1" comment="net-snmp-agent-libs is &lt;5.9.1-17.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054696" version="1" comment="net-snmp-devel is &lt;5.9.1-17.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054697" version="1" comment="net-snmp-libs is &lt;5.9.1-17.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054698" version="1" comment="net-snmp-perl is &lt;5.9.1-17.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054699" version="1" comment="net-snmp-utils is &lt;5.9.1-17.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054700" version="1" comment="python3-net-snmp is &lt;5.9.1-17.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054701" version="1" comment="transfig is &lt;3.2.7b-11.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054702" version="1" comment="gnupg2 is &lt;2.3.3-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054703" version="1" comment="gnupg2-smime is &lt;2.3.3-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054704" version="1" comment="jmc is &lt;8.2.0-18.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054705" version="1" comment="gpsd-minimal is &lt;3.26.1-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054706" version="1" comment="gpsd-minimal-clients is &lt;3.26.1-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054707" version="1" comment="kernel is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054708" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.24.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054709" version="1" comment="kernel-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054710" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054711" version="1" comment="kernel-debug is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054712" version="1" comment="kernel-debug-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054713" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054714" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054715" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054716" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054717" version="1" comment="kernel-doc is &lt;5.14.0-611.24.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054718" version="1" comment="kernel-headers is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054719" version="1" comment="kernel-modules is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054720" version="1" comment="kernel-modules-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054721" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054722" version="1" comment="kernel-rt is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054723" version="1" comment="kernel-rt-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054724" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054725" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054726" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054727" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054728" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054729" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054730" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054731" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054732" version="1" comment="kernel-tools is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054733" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054734" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054735" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054736" version="1" comment="libperf is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054737" version="1" comment="perf is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054738" version="1" comment="python3-perf is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054739" version="1" comment="rtla is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054740" version="1" comment="rv is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053475" version="1" comment="java-11-openjdk is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043334" version="1" comment="java-11-openjdk-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053476" version="1" comment="java-11-openjdk-demo is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043336" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053477" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053478" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053479" version="1" comment="java-11-openjdk-devel is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043340" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053480" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053481" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053482" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053483" version="1" comment="java-11-openjdk-headless is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043345" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053484" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053485" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053486" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043349" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053487" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043351" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053488" version="1" comment="java-11-openjdk-jmods is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043353" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053489" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053490" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053491" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053492" version="1" comment="java-11-openjdk-src is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043358" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053493" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053494" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053495" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043362" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053496" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053497" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054741" version="1" comment="gimp is &lt;3.0.4-1.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054742" version="1" comment="gimp-libs is &lt;3.0.4-1.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054743" version="1" comment="go-toolset is &lt;1.25.5-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054744" version="1" comment="golang is &lt;1.25.5-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054745" version="1" comment="golang-bin is &lt;1.25.5-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054746" version="1" comment="golang-docs is &lt;1.25.5-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054747" version="1" comment="golang-misc is &lt;1.25.5-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054748" version="1" comment="golang-race is &lt;1.25.5-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054749" version="1" comment="golang-src is &lt;1.25.5-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054750" version="1" comment="golang-tests is &lt;1.25.5-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054751" version="1" comment="thunderbird is &lt;140.7.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039028" version="1" comment="java-17-openjdk is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039029" version="1" comment="java-17-openjdk-demo is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039030" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039031" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039032" version="1" comment="java-17-openjdk-devel is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039033" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039034" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039035" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039036" version="1" comment="java-17-openjdk-headless is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039037" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039038" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039039" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039040" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039041" version="1" comment="java-17-openjdk-jmods is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039042" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039043" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039044" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039045" version="1" comment="java-17-openjdk-src is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039046" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039047" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039048" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039049" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039050" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039592" version="1" comment="java-21-openjdk is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039593" version="1" comment="java-21-openjdk-demo is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039594" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039595" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039596" version="1" comment="java-21-openjdk-devel is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039597" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039598" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039599" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039600" version="1" comment="java-21-openjdk-headless is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039601" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039602" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039603" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039604" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039605" version="1" comment="java-21-openjdk-jmods is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039606" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039607" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039608" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039609" version="1" comment="java-21-openjdk-src is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039610" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039611" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039612" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039613" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039614" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040212" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040213" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040214" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040215" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040216" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040217" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040218" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040219" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040220" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040221" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040222" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040223" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040224" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.482.b08-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040225" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.482.b08-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040226" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040227" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.482.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040228" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.482.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054752" version="1" comment="java-25-openjdk is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054753" version="1" comment="java-25-openjdk-crypto-adapter is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054754" version="1" comment="java-25-openjdk-crypto-adapter-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054755" version="1" comment="java-25-openjdk-crypto-adapter-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054756" version="1" comment="java-25-openjdk-demo is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054757" version="1" comment="java-25-openjdk-demo-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054758" version="1" comment="java-25-openjdk-demo-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054759" version="1" comment="java-25-openjdk-devel is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054760" version="1" comment="java-25-openjdk-devel-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054761" version="1" comment="java-25-openjdk-devel-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054762" version="1" comment="java-25-openjdk-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054763" version="1" comment="java-25-openjdk-headless is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054764" version="1" comment="java-25-openjdk-headless-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054765" version="1" comment="java-25-openjdk-headless-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054766" version="1" comment="java-25-openjdk-javadoc is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054767" version="1" comment="java-25-openjdk-javadoc-zip is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054768" version="1" comment="java-25-openjdk-jmods is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054769" version="1" comment="java-25-openjdk-jmods-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054770" version="1" comment="java-25-openjdk-jmods-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054771" version="1" comment="java-25-openjdk-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054772" version="1" comment="java-25-openjdk-src is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054773" version="1" comment="java-25-openjdk-src-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054774" version="1" comment="java-25-openjdk-src-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054775" version="1" comment="java-25-openjdk-static-libs is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054776" version="1" comment="java-25-openjdk-static-libs-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054777" version="1" comment="java-25-openjdk-static-libs-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054778" version="1" comment="glib2 is &lt;2.68.4-18.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054779" version="1" comment="glib2-devel is &lt;2.68.4-18.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054780" version="1" comment="glib2-doc is &lt;2.68.4-18.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054781" version="1" comment="glib2-static is &lt;2.68.4-18.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054782" version="1" comment="glib2-tests is &lt;2.68.4-18.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054783" version="1" comment="python3-urllib3 is &lt;1.26.5-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054784" version="1" comment="python3.12-urllib3 is &lt;1.26.19-1.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054785" version="1" comment="python3.11-urllib3 is &lt;1.26.12-5.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054786" version="1" comment="kernel is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054787" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.26.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054788" version="1" comment="kernel-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054789" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054790" version="1" comment="kernel-debug is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054791" version="1" comment="kernel-debug-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054792" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054793" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054794" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054795" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054796" version="1" comment="kernel-doc is &lt;5.14.0-611.26.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054797" version="1" comment="kernel-headers is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054798" version="1" comment="kernel-modules is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054799" version="1" comment="kernel-modules-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054800" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054801" version="1" comment="kernel-rt is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054802" version="1" comment="kernel-rt-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054803" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054804" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054805" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054806" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054807" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054808" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054809" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054810" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054811" version="1" comment="kernel-tools is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054812" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054813" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054814" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054815" version="1" comment="libperf is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054816" version="1" comment="perf is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054817" version="1" comment="python3-perf is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054818" version="1" comment="rtla is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054819" version="1" comment="rv is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054820" version="1" comment="fence-agents-aliyun is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054821" version="1" comment="fence-agents-all is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054822" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054823" version="1" comment="fence-agents-apc is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054824" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054825" version="1" comment="fence-agents-aws is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054826" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054827" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054828" version="1" comment="fence-agents-brocade is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054829" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054830" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054831" version="1" comment="fence-agents-common is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054832" version="1" comment="fence-agents-compute is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054833" version="1" comment="fence-agents-drac5 is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054834" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054835" version="1" comment="fence-agents-emerson is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054836" version="1" comment="fence-agents-eps is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054837" version="1" comment="fence-agents-gce is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054838" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054839" version="1" comment="fence-agents-hpblade is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054840" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054841" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054842" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054843" version="1" comment="fence-agents-ifmib is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054844" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054845" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054846" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054847" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054848" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054849" version="1" comment="fence-agents-ipdu is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054850" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054851" version="1" comment="fence-agents-kdump is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054852" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054853" version="1" comment="fence-agents-lpar is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054854" version="1" comment="fence-agents-mpath is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054855" version="1" comment="fence-agents-nutanix-ahv is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054856" version="1" comment="fence-agents-openstack is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054857" version="1" comment="fence-agents-redfish is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054858" version="1" comment="fence-agents-rhevm is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054859" version="1" comment="fence-agents-rsa is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054860" version="1" comment="fence-agents-rsb is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054861" version="1" comment="fence-agents-sbd is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054862" version="1" comment="fence-agents-scsi is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054863" version="1" comment="fence-agents-virsh is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054864" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054865" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054866" version="1" comment="fence-agents-wti is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054867" version="1" comment="fence-virt is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054868" version="1" comment="fence-virtd is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054869" version="1" comment="fence-virtd-cpg is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054870" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054871" version="1" comment="fence-virtd-multicast is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054872" version="1" comment="fence-virtd-serial is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054873" version="1" comment="fence-virtd-tcp is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054874" version="1" comment="ha-cloud-support is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054875" version="1" comment="curl is &lt;7.76.1-35.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054876" version="1" comment="curl-minimal is &lt;7.76.1-35.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054877" version="1" comment="libcurl is &lt;7.76.1-35.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054878" version="1" comment="libcurl-devel is &lt;7.76.1-35.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054879" version="1" comment="libcurl-minimal is &lt;7.76.1-35.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054880" version="1" comment="gcc-toolset-15-binutils is &lt;2.44-3.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054881" version="1" comment="gcc-toolset-15-binutils-devel is &lt;2.44-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054882" version="1" comment="gcc-toolset-15-binutils-gold is &lt;2.44-3.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054883" version="1" comment="gcc-toolset-15-binutils-gprofng is &lt;2.44-3.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054884" version="1" comment="python3.12 is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054885" version="1" comment="python3.12-debug is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054886" version="1" comment="python3.12-devel is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054887" version="1" comment="python3.12-idle is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054888" version="1" comment="python3.12-libs is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054889" version="1" comment="python3.12-test is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054890" version="1" comment="python3.12-tkinter is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054891" version="1" comment="php is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054892" version="1" comment="php-bcmath is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054893" version="1" comment="php-cli is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054894" version="1" comment="php-common is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054895" version="1" comment="php-dba is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054896" version="1" comment="php-dbg is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054897" version="1" comment="php-devel is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054898" version="1" comment="php-embedded is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054899" version="1" comment="php-enchant is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054900" version="1" comment="php-ffi is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054901" version="1" comment="php-fpm is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054902" version="1" comment="php-gd is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054903" version="1" comment="php-gmp is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054904" version="1" comment="php-intl is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054905" version="1" comment="php-ldap is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054906" version="1" comment="php-mbstring is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054907" version="1" comment="php-mysqlnd is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054908" version="1" comment="php-odbc is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054909" version="1" comment="php-opcache is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054910" version="1" comment="php-pdo is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054911" version="1" comment="php-pgsql is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054912" version="1" comment="php-process is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054913" version="1" comment="php-snmp is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054914" version="1" comment="php-soap is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054915" version="1" comment="php-xml is &lt;8.2.30-1.module+el9.7.0+23849+7b831f17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054916" version="1" comment="python3.11 is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054917" version="1" comment="python3.11-debug is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054918" version="1" comment="python3.11-devel is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054919" version="1" comment="python3.11-idle is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054920" version="1" comment="python3.11-libs is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054921" version="1" comment="python3.11-test is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054922" version="1" comment="python3.11-tkinter is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054923" version="1" comment="php is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054924" version="1" comment="php-bcmath is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054925" version="1" comment="php-cli is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054926" version="1" comment="php-common is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054927" version="1" comment="php-dba is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054928" version="1" comment="php-dbg is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054929" version="1" comment="php-devel is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054930" version="1" comment="php-embedded is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054931" version="1" comment="php-enchant is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054932" version="1" comment="php-ffi is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054933" version="1" comment="php-fpm is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054934" version="1" comment="php-gd is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054935" version="1" comment="php-gmp is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054936" version="1" comment="php-intl is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054937" version="1" comment="php-ldap is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054938" version="1" comment="php-mbstring is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054939" version="1" comment="php-mysqlnd is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054940" version="1" comment="php-odbc is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054941" version="1" comment="php-opcache is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054942" version="1" comment="php-pdo is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054943" version="1" comment="php-pgsql is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054944" version="1" comment="php-process is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054945" version="1" comment="php-snmp is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054946" version="1" comment="php-soap is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054947" version="1" comment="php-xml is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054948" version="1" comment="openssl is &lt;3.5.1-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054949" version="1" comment="openssl-devel is &lt;3.5.1-7.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054950" version="1" comment="openssl-libs is &lt;3.5.1-7.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054951" version="1" comment="openssl-perl is &lt;3.5.1-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054952" version="1" comment="python-unversioned-command is &lt;3.9.25-3.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054953" version="1" comment="python3 is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054954" version="1" comment="python3-debug is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054955" version="1" comment="python3-devel is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054956" version="1" comment="python3-idle is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054957" version="1" comment="python3-libs is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054958" version="1" comment="python3-test is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054959" version="1" comment="python3-tkinter is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054960" version="1" comment="iperf3 is &lt;3.9-14.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054961" version="1" comment="kernel is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054962" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.27.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054963" version="1" comment="kernel-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054964" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054965" version="1" comment="kernel-debug is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054966" version="1" comment="kernel-debug-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054967" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054968" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054969" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054970" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054971" version="1" comment="kernel-doc is &lt;5.14.0-611.27.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054972" version="1" comment="kernel-headers is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054973" version="1" comment="kernel-modules is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054974" version="1" comment="kernel-modules-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054975" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054976" version="1" comment="kernel-rt is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054977" version="1" comment="kernel-rt-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054978" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054979" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054980" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054981" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054982" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054983" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054984" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054985" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054986" version="1" comment="kernel-tools is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054987" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054988" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054989" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054990" version="1" comment="libperf is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054991" version="1" comment="perf is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054992" version="1" comment="python3-perf is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054993" version="1" comment="rtla is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054994" version="1" comment="rv is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054995" version="1" comment="fence-agents-aliyun is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054996" version="1" comment="fence-agents-all is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054997" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054998" version="1" comment="fence-agents-apc is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054999" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055000" version="1" comment="fence-agents-aws is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055001" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055002" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055003" version="1" comment="fence-agents-brocade is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055004" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055005" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055006" version="1" comment="fence-agents-common is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055007" version="1" comment="fence-agents-compute is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055008" version="1" comment="fence-agents-drac5 is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055009" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055010" version="1" comment="fence-agents-emerson is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055011" version="1" comment="fence-agents-eps is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055012" version="1" comment="fence-agents-gce is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055013" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055014" version="1" comment="fence-agents-hpblade is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055015" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055016" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055017" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055018" version="1" comment="fence-agents-ifmib is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055019" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055020" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055021" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055022" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055023" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055024" version="1" comment="fence-agents-ipdu is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055025" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055026" version="1" comment="fence-agents-kdump is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055027" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055028" version="1" comment="fence-agents-lpar is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055029" version="1" comment="fence-agents-mpath is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055030" version="1" comment="fence-agents-nutanix-ahv is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055031" version="1" comment="fence-agents-openstack is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055032" version="1" comment="fence-agents-redfish is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055033" version="1" comment="fence-agents-rhevm is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055034" version="1" comment="fence-agents-rsa is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055035" version="1" comment="fence-agents-rsb is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055036" version="1" comment="fence-agents-sbd is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055037" version="1" comment="fence-agents-scsi is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055038" version="1" comment="fence-agents-virsh is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055039" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055040" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055041" version="1" comment="fence-agents-wti is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055042" version="1" comment="fence-virt is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055043" version="1" comment="fence-virtd is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055044" version="1" comment="fence-virtd-cpg is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055045" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055046" version="1" comment="fence-virtd-multicast is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055047" version="1" comment="fence-virtd-serial is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055048" version="1" comment="fence-virtd-tcp is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055049" version="1" comment="ha-cloud-support is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055050" version="1" comment="libblkid is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055051" version="1" comment="libblkid-devel is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055052" version="1" comment="libfdisk is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055053" version="1" comment="libfdisk-devel is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055054" version="1" comment="libmount is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055055" version="1" comment="libmount-devel is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055056" version="1" comment="libsmartcols is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055057" version="1" comment="libsmartcols-devel is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055058" version="1" comment="libuuid is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055059" version="1" comment="libuuid-devel is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055060" version="1" comment="python3-libmount is &lt;2.37.4-21.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055061" version="1" comment="util-linux is &lt;2.37.4-21.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055062" version="1" comment="util-linux-core is &lt;2.37.4-21.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055063" version="1" comment="util-linux-user is &lt;2.37.4-21.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055064" version="1" comment="uuidd is &lt;2.37.4-21.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055065" version="1" comment="python3.12-wheel is &lt;0.41.2-3.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055066" version="1" comment="python3.12-wheel-wheel is &lt;0.41.2-3.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055067" version="1" comment="fontforge is &lt;20201107-7.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055068" version="1" comment="brotli is &lt;1.0.9-9.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055069" version="1" comment="brotli-devel is &lt;1.0.9-9.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055070" version="1" comment="libbrotli is &lt;1.0.9-9.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055071" version="1" comment="python3-brotli is &lt;1.0.9-9.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055072" version="1" comment="freerdp is &lt;2.11.7-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055073" version="1" comment="freerdp-devel is &lt;2.11.7-1.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055074" version="1" comment="freerdp-libs is &lt;2.11.7-1.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055075" version="1" comment="libwinpr is &lt;2.11.7-1.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055076" version="1" comment="libwinpr-devel is &lt;2.11.7-1.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055077" version="1" comment="kernel is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055078" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.30.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055079" version="1" comment="kernel-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055080" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055081" version="1" comment="kernel-debug is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055082" version="1" comment="kernel-debug-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055083" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055084" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055085" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055086" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055087" version="1" comment="kernel-doc is &lt;5.14.0-611.30.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055088" version="1" comment="kernel-headers is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055089" version="1" comment="kernel-modules is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055090" version="1" comment="kernel-modules-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055091" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055092" version="1" comment="kernel-rt is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055093" version="1" comment="kernel-rt-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055094" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055095" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055096" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055097" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055098" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055099" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055100" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055101" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055102" version="1" comment="kernel-tools is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055103" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055104" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055105" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055106" version="1" comment="libperf is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055107" version="1" comment="perf is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055108" version="1" comment="python3-perf is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055109" version="1" comment="rtla is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055110" version="1" comment="rv is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055111" version="1" comment="libsoup is &lt;2.72.0-12.el9_7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055112" version="1" comment="libsoup-devel is &lt;2.72.0-12.el9_7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055113" version="1" comment="keylime is &lt;7.12.1-11.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055114" version="1" comment="keylime-base is &lt;7.12.1-11.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055115" version="1" comment="keylime-registrar is &lt;7.12.1-11.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055116" version="1" comment="keylime-selinux is &lt;7.12.1-11.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055117" version="1" comment="keylime-tenant is &lt;7.12.1-11.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055118" version="1" comment="keylime-verifier is &lt;7.12.1-11.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055119" version="1" comment="python3-keylime is &lt;7.12.1-11.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055120" version="1" comment="pcs is &lt;0.11.10-1.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055121" version="1" comment="pcs-snmp is &lt;0.11.10-1.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055122" version="1" comment="gimp is &lt;3.0.4-1.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055123" version="1" comment="gimp-libs is &lt;3.0.4-1.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055124" version="1" comment="go-toolset is &lt;1.25.7-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055125" version="1" comment="golang is &lt;1.25.7-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055126" version="1" comment="golang-bin is &lt;1.25.7-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055127" version="1" comment="golang-docs is &lt;1.25.7-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055128" version="1" comment="golang-misc is &lt;1.25.7-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055129" version="1" comment="golang-race is &lt;1.25.7-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055130" version="1" comment="golang-src is &lt;1.25.7-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055131" version="1" comment="golang-tests is &lt;1.25.7-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055132" version="1" comment="kernel is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055133" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.34.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055134" version="1" comment="kernel-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055135" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055136" version="1" comment="kernel-debug is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055137" version="1" comment="kernel-debug-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055138" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055139" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055140" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055141" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055142" version="1" comment="kernel-doc is &lt;5.14.0-611.34.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055143" version="1" comment="kernel-headers is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055144" version="1" comment="kernel-modules is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055145" version="1" comment="kernel-modules-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055146" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055147" version="1" comment="kernel-rt is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055148" version="1" comment="kernel-rt-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055149" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055150" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055151" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055152" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055153" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055154" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055155" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055156" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055157" version="1" comment="kernel-tools is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055158" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055159" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055160" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055161" version="1" comment="libperf is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055162" version="1" comment="perf is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055163" version="1" comment="python3-perf is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055164" version="1" comment="rtla is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055165" version="1" comment="rv is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055166" version="1" comment="edk2-ovmf is &lt;20241117-4.el9_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055167" version="1" comment="edk2-tools is &lt;20241117-4.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055168" version="1" comment="edk2-tools-doc is &lt;20241117-4.el9_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055169" version="1" comment="nodejs is &lt;24.13.0-1.module+el9.7.0+23894+c8377628 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055170" version="1" comment="nodejs-devel is &lt;24.13.0-1.module+el9.7.0+23894+c8377628 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055171" version="1" comment="nodejs-docs is &lt;24.13.0-1.module+el9.7.0+23894+c8377628 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055172" version="1" comment="nodejs-full-i18n is &lt;24.13.0-1.module+el9.7.0+23894+c8377628 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055173" version="1" comment="nodejs-libs is &lt;24.13.0-1.module+el9.7.0+23894+c8377628 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055174" version="1" comment="nodejs-nodemon is &lt;3.0.3-3.module+el9.7.0+23894+c8377628 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055175" version="1" comment="nodejs-packaging is &lt;2021.06-6.module+el9.7.0+23894+c8377628 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055176" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-6.module+el9.7.0+23894+c8377628 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055177" version="1" comment="npm is &lt;11.6.2-1.24.13.0.1.module+el9.7.0+23894+c8377628 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055178" version="1" comment="v8-13.6-devel is &lt;13.6.233.17-1.24.13.0.1.module+el9.7.0+23894+c8377628 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055179" version="1" comment="nodejs is &lt;22.22.0-1.module+el9.7.0+23896+b5802de9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055180" version="1" comment="nodejs-devel is &lt;22.22.0-1.module+el9.7.0+23896+b5802de9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055181" version="1" comment="nodejs-docs is &lt;22.22.0-1.module+el9.7.0+23896+b5802de9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055182" version="1" comment="nodejs-full-i18n is &lt;22.22.0-1.module+el9.7.0+23896+b5802de9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055183" version="1" comment="nodejs-libs is &lt;22.22.0-1.module+el9.7.0+23896+b5802de9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055184" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.7.0+23896+b5802de9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055185" version="1" comment="nodejs-packaging is &lt;2021.06-5.module+el9.7.0+23896+b5802de9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055186" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-5.module+el9.7.0+23896+b5802de9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055187" version="1" comment="npm is &lt;10.9.4-1.22.22.0.1.module+el9.7.0+23896+b5802de9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055188" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.22.0.1.module+el9.7.0+23896+b5802de9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055189" version="1" comment="nodejs is &lt;20.20.0-1.module+el9.7.0+23895+0637d423 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055190" version="1" comment="nodejs-devel is &lt;20.20.0-1.module+el9.7.0+23895+0637d423 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055191" version="1" comment="nodejs-docs is &lt;20.20.0-1.module+el9.7.0+23895+0637d423 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055192" version="1" comment="nodejs-full-i18n is &lt;20.20.0-1.module+el9.7.0+23895+0637d423 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055193" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.7.0+23895+0637d423 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055194" version="1" comment="nodejs-packaging is &lt;2021.06-5.module+el9.7.0+23895+0637d423 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055195" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-5.module+el9.7.0+23895+0637d423 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055196" version="1" comment="npm is &lt;10.8.2-1.20.20.0.1.module+el9.7.0+23895+0637d423 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055197" version="1" comment="glibc is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055198" version="1" comment="glibc-all-langpacks is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055199" version="1" comment="glibc-benchtests is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055200" version="1" comment="glibc-common is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055201" version="1" comment="glibc-devel is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055202" version="1" comment="glibc-doc is &lt;2.34-231.el9_7.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055203" version="1" comment="glibc-gconv-extra is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055204" version="1" comment="glibc-headers is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055205" version="1" comment="glibc-langpack-aa is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055206" version="1" comment="glibc-langpack-af is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055207" version="1" comment="glibc-langpack-agr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055208" version="1" comment="glibc-langpack-ak is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055209" version="1" comment="glibc-langpack-am is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055210" version="1" comment="glibc-langpack-an is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055211" version="1" comment="glibc-langpack-anp is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055212" version="1" comment="glibc-langpack-ar is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055213" version="1" comment="glibc-langpack-as is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055214" version="1" comment="glibc-langpack-ast is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055215" version="1" comment="glibc-langpack-ayc is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055216" version="1" comment="glibc-langpack-az is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055217" version="1" comment="glibc-langpack-be is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055218" version="1" comment="glibc-langpack-bem is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055219" version="1" comment="glibc-langpack-ber is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055220" version="1" comment="glibc-langpack-bg is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055221" version="1" comment="glibc-langpack-bhb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055222" version="1" comment="glibc-langpack-bho is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055223" version="1" comment="glibc-langpack-bi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055224" version="1" comment="glibc-langpack-bn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055225" version="1" comment="glibc-langpack-bo is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055226" version="1" comment="glibc-langpack-br is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055227" version="1" comment="glibc-langpack-brx is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055228" version="1" comment="glibc-langpack-bs is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055229" version="1" comment="glibc-langpack-byn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055230" version="1" comment="glibc-langpack-ca is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055231" version="1" comment="glibc-langpack-ce is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055232" version="1" comment="glibc-langpack-chr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055233" version="1" comment="glibc-langpack-ckb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055234" version="1" comment="glibc-langpack-cmn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055235" version="1" comment="glibc-langpack-crh is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055236" version="1" comment="glibc-langpack-cs is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055237" version="1" comment="glibc-langpack-csb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055238" version="1" comment="glibc-langpack-cv is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055239" version="1" comment="glibc-langpack-cy is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055240" version="1" comment="glibc-langpack-da is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055241" version="1" comment="glibc-langpack-de is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055242" version="1" comment="glibc-langpack-doi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055243" version="1" comment="glibc-langpack-dsb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055244" version="1" comment="glibc-langpack-dv is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055245" version="1" comment="glibc-langpack-dz is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055246" version="1" comment="glibc-langpack-el is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055247" version="1" comment="glibc-langpack-en is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055248" version="1" comment="glibc-langpack-eo is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055249" version="1" comment="glibc-langpack-es is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055250" version="1" comment="glibc-langpack-et is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055251" version="1" comment="glibc-langpack-eu is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055252" version="1" comment="glibc-langpack-fa is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055253" version="1" comment="glibc-langpack-ff is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055254" version="1" comment="glibc-langpack-fi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055255" version="1" comment="glibc-langpack-fil is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055256" version="1" comment="glibc-langpack-fo is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055257" version="1" comment="glibc-langpack-fr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055258" version="1" comment="glibc-langpack-fur is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055259" version="1" comment="glibc-langpack-fy is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055260" version="1" comment="glibc-langpack-ga is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055261" version="1" comment="glibc-langpack-gd is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055262" version="1" comment="glibc-langpack-gez is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055263" version="1" comment="glibc-langpack-gl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055264" version="1" comment="glibc-langpack-gu is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055265" version="1" comment="glibc-langpack-gv is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055266" version="1" comment="glibc-langpack-ha is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055267" version="1" comment="glibc-langpack-hak is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055268" version="1" comment="glibc-langpack-he is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055269" version="1" comment="glibc-langpack-hi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055270" version="1" comment="glibc-langpack-hif is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055271" version="1" comment="glibc-langpack-hne is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055272" version="1" comment="glibc-langpack-hr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055273" version="1" comment="glibc-langpack-hsb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055274" version="1" comment="glibc-langpack-ht is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055275" version="1" comment="glibc-langpack-hu is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055276" version="1" comment="glibc-langpack-hy is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055277" version="1" comment="glibc-langpack-ia is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055278" version="1" comment="glibc-langpack-id is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055279" version="1" comment="glibc-langpack-ig is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055280" version="1" comment="glibc-langpack-ik is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055281" version="1" comment="glibc-langpack-is is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055282" version="1" comment="glibc-langpack-it is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055283" version="1" comment="glibc-langpack-iu is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055284" version="1" comment="glibc-langpack-ja is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055285" version="1" comment="glibc-langpack-ka is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055286" version="1" comment="glibc-langpack-kab is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055287" version="1" comment="glibc-langpack-kk is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055288" version="1" comment="glibc-langpack-kl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055289" version="1" comment="glibc-langpack-km is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055290" version="1" comment="glibc-langpack-kn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055291" version="1" comment="glibc-langpack-ko is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055292" version="1" comment="glibc-langpack-kok is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055293" version="1" comment="glibc-langpack-ks is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055294" version="1" comment="glibc-langpack-ku is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055295" version="1" comment="glibc-langpack-kw is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055296" version="1" comment="glibc-langpack-ky is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055297" version="1" comment="glibc-langpack-lb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055298" version="1" comment="glibc-langpack-lg is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055299" version="1" comment="glibc-langpack-li is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055300" version="1" comment="glibc-langpack-lij is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055301" version="1" comment="glibc-langpack-ln is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055302" version="1" comment="glibc-langpack-lo is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055303" version="1" comment="glibc-langpack-lt is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055304" version="1" comment="glibc-langpack-lv is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055305" version="1" comment="glibc-langpack-lzh is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055306" version="1" comment="glibc-langpack-mag is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055307" version="1" comment="glibc-langpack-mai is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055308" version="1" comment="glibc-langpack-mfe is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055309" version="1" comment="glibc-langpack-mg is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055310" version="1" comment="glibc-langpack-mhr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055311" version="1" comment="glibc-langpack-mi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055312" version="1" comment="glibc-langpack-miq is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055313" version="1" comment="glibc-langpack-mjw is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055314" version="1" comment="glibc-langpack-mk is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055315" version="1" comment="glibc-langpack-ml is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055316" version="1" comment="glibc-langpack-mn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055317" version="1" comment="glibc-langpack-mni is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055318" version="1" comment="glibc-langpack-mnw is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055319" version="1" comment="glibc-langpack-mr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055320" version="1" comment="glibc-langpack-ms is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055321" version="1" comment="glibc-langpack-mt is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055322" version="1" comment="glibc-langpack-my is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055323" version="1" comment="glibc-langpack-nan is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055324" version="1" comment="glibc-langpack-nb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055325" version="1" comment="glibc-langpack-nds is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055326" version="1" comment="glibc-langpack-ne is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055327" version="1" comment="glibc-langpack-nhn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055328" version="1" comment="glibc-langpack-niu is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055329" version="1" comment="glibc-langpack-nl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055330" version="1" comment="glibc-langpack-nn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055331" version="1" comment="glibc-langpack-nr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055332" version="1" comment="glibc-langpack-nso is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055333" version="1" comment="glibc-langpack-oc is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055334" version="1" comment="glibc-langpack-om is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055335" version="1" comment="glibc-langpack-or is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055336" version="1" comment="glibc-langpack-os is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055337" version="1" comment="glibc-langpack-pa is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055338" version="1" comment="glibc-langpack-pap is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055339" version="1" comment="glibc-langpack-pl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055340" version="1" comment="glibc-langpack-ps is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055341" version="1" comment="glibc-langpack-pt is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055342" version="1" comment="glibc-langpack-quz is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055343" version="1" comment="glibc-langpack-raj is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055344" version="1" comment="glibc-langpack-ro is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055345" version="1" comment="glibc-langpack-ru is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055346" version="1" comment="glibc-langpack-rw is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055347" version="1" comment="glibc-langpack-sa is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055348" version="1" comment="glibc-langpack-sah is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055349" version="1" comment="glibc-langpack-sat is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055350" version="1" comment="glibc-langpack-sc is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055351" version="1" comment="glibc-langpack-sd is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055352" version="1" comment="glibc-langpack-se is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055353" version="1" comment="glibc-langpack-sgs is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055354" version="1" comment="glibc-langpack-shn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055355" version="1" comment="glibc-langpack-shs is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055356" version="1" comment="glibc-langpack-si is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055357" version="1" comment="glibc-langpack-sid is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055358" version="1" comment="glibc-langpack-sk is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055359" version="1" comment="glibc-langpack-sl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055360" version="1" comment="glibc-langpack-sm is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055361" version="1" comment="glibc-langpack-so is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055362" version="1" comment="glibc-langpack-sq is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055363" version="1" comment="glibc-langpack-sr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055364" version="1" comment="glibc-langpack-ss is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055365" version="1" comment="glibc-langpack-st is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055366" version="1" comment="glibc-langpack-sv is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055367" version="1" comment="glibc-langpack-sw is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055368" version="1" comment="glibc-langpack-szl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055369" version="1" comment="glibc-langpack-ta is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055370" version="1" comment="glibc-langpack-tcy is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055371" version="1" comment="glibc-langpack-te is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055372" version="1" comment="glibc-langpack-tg is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055373" version="1" comment="glibc-langpack-th is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055374" version="1" comment="glibc-langpack-the is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055375" version="1" comment="glibc-langpack-ti is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055376" version="1" comment="glibc-langpack-tig is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055377" version="1" comment="glibc-langpack-tk is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055378" version="1" comment="glibc-langpack-tl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055379" version="1" comment="glibc-langpack-tn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055380" version="1" comment="glibc-langpack-to is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055381" version="1" comment="glibc-langpack-tpi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055382" version="1" comment="glibc-langpack-tr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055383" version="1" comment="glibc-langpack-ts is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055384" version="1" comment="glibc-langpack-tt is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055385" version="1" comment="glibc-langpack-ug is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055386" version="1" comment="glibc-langpack-uk is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055387" version="1" comment="glibc-langpack-unm is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055388" version="1" comment="glibc-langpack-ur is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055389" version="1" comment="glibc-langpack-uz is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055390" version="1" comment="glibc-langpack-ve is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055391" version="1" comment="glibc-langpack-vi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055392" version="1" comment="glibc-langpack-wa is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055393" version="1" comment="glibc-langpack-wae is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055394" version="1" comment="glibc-langpack-wal is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055395" version="1" comment="glibc-langpack-wo is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055396" version="1" comment="glibc-langpack-xh is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055397" version="1" comment="glibc-langpack-yi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055398" version="1" comment="glibc-langpack-yo is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055399" version="1" comment="glibc-langpack-yue is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055400" version="1" comment="glibc-langpack-yuw is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055401" version="1" comment="glibc-langpack-zh is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055402" version="1" comment="glibc-langpack-zu is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055403" version="1" comment="glibc-locale-source is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055404" version="1" comment="glibc-minimal-langpack is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055405" version="1" comment="glibc-nss-devel is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055406" version="1" comment="glibc-static is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055407" version="1" comment="glibc-utils is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055408" version="1" comment="libnsl is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055409" version="1" comment="nscd is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055410" version="1" comment="nss_db is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055411" version="1" comment="nss_hesiod is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055412" version="1" comment="php is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055413" version="1" comment="php-bcmath is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055414" version="1" comment="php-cli is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055415" version="1" comment="php-common is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055416" version="1" comment="php-dba is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055417" version="1" comment="php-dbg is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055418" version="1" comment="php-devel is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055419" version="1" comment="php-embedded is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055420" version="1" comment="php-enchant is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055421" version="1" comment="php-ffi is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055422" version="1" comment="php-fpm is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055423" version="1" comment="php-gd is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055424" version="1" comment="php-gmp is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055425" version="1" comment="php-intl is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055426" version="1" comment="php-ldap is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055427" version="1" comment="php-mbstring is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055428" version="1" comment="php-mysqlnd is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055429" version="1" comment="php-odbc is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055430" version="1" comment="php-opcache is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055431" version="1" comment="php-pdo is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055432" version="1" comment="php-pgsql is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055433" version="1" comment="php-process is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055434" version="1" comment="php-snmp is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055435" version="1" comment="php-soap is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055436" version="1" comment="php-xml is &lt;8.0.30-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055437" version="1" comment="grafana is &lt;10.2.6-18.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055438" version="1" comment="grafana-selinux is &lt;10.2.6-18.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055439" version="1" comment="libpng15 is &lt;1.5.30-14.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055440" version="1" comment="munge is &lt;0.5.13-14.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055441" version="1" comment="munge-devel is &lt;0.5.13-14.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055442" version="1" comment="munge-libs is &lt;0.5.13-14.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055443" version="1" comment="grafana-pcp is &lt;5.1.1-12.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055444" version="1" comment="kernel is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055445" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.35.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055446" version="1" comment="kernel-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055447" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055448" version="1" comment="kernel-debug is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055449" version="1" comment="kernel-debug-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055450" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055451" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055452" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055453" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055454" version="1" comment="kernel-doc is &lt;5.14.0-611.35.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055455" version="1" comment="kernel-headers is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055456" version="1" comment="kernel-modules is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055457" version="1" comment="kernel-modules-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055458" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055459" version="1" comment="kernel-rt is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055460" version="1" comment="kernel-rt-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055461" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055462" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055463" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055464" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055465" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055466" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055467" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055468" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055469" version="1" comment="kernel-tools is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055470" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055471" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055472" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055473" version="1" comment="libperf is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055474" version="1" comment="perf is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055475" version="1" comment="python3-perf is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055476" version="1" comment="rtla is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055477" version="1" comment="rv is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055478" version="1" comment="freerdp is &lt;2.11.7-1.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055479" version="1" comment="freerdp-devel is &lt;2.11.7-1.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055480" version="1" comment="freerdp-libs is &lt;2.11.7-1.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055481" version="1" comment="libwinpr is &lt;2.11.7-1.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055482" version="1" comment="libwinpr-devel is &lt;2.11.7-1.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055483" version="1" comment="protobuf is &lt;3.14.0-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055484" version="1" comment="protobuf-compiler is &lt;3.14.0-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055485" version="1" comment="protobuf-devel is &lt;3.14.0-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055486" version="1" comment="protobuf-lite is &lt;3.14.0-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055487" version="1" comment="protobuf-lite-devel is &lt;3.14.0-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055488" version="1" comment="python3-protobuf is &lt;3.14.0-17.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055489" version="1" comment="389-ds-base is &lt;2.7.0-10.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055490" version="1" comment="389-ds-base-devel is &lt;2.7.0-10.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055491" version="1" comment="389-ds-base-libs is &lt;2.7.0-10.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055492" version="1" comment="389-ds-base-snmp is &lt;2.7.0-10.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055493" version="1" comment="python3-lib389 is &lt;2.7.0-10.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055494" version="1" comment="runc is &lt;1.4.0-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055495" version="1" comment="buildah is &lt;1.41.8-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055496" version="1" comment="buildah-tests is &lt;1.41.8-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055497" version="1" comment="podman is &lt;5.6.0-14.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055498" version="1" comment="podman-docker is &lt;5.6.0-14.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055499" version="1" comment="podman-plugins is &lt;5.6.0-14.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055500" version="1" comment="podman-remote is &lt;5.6.0-14.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055501" version="1" comment="podman-tests is &lt;5.6.0-14.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055502" version="1" comment="firefox is &lt;140.8.0-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055503" version="1" comment="firefox-x11 is &lt;140.8.0-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055504" version="1" comment="skopeo is &lt;1.20.0-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055505" version="1" comment="skopeo-tests is &lt;1.20.0-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055506" version="1" comment="containernetworking-plugins is &lt;1.7.1-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055507" version="1" comment="python3-pyasn1 is &lt;0.4.8-7.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055508" version="1" comment="python3-pyasn1-modules is &lt;0.4.8-7.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055509" version="1" comment="libpng is &lt;1.6.37-12.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055510" version="1" comment="libpng-devel is &lt;1.6.37-12.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055511" version="1" comment="kernel is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055512" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.36.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055513" version="1" comment="kernel-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055514" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055515" version="1" comment="kernel-debug is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055516" version="1" comment="kernel-debug-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055517" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055518" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055519" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055520" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055521" version="1" comment="kernel-doc is &lt;5.14.0-611.36.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055522" version="1" comment="kernel-headers is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055523" version="1" comment="kernel-modules is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055524" version="1" comment="kernel-modules-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055525" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055526" version="1" comment="kernel-rt is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055527" version="1" comment="kernel-rt-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055528" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055529" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055530" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055531" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055532" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055533" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055534" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055535" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055536" version="1" comment="kernel-tools is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055537" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055538" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055539" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055540" version="1" comment="libperf is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055541" version="1" comment="perf is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055542" version="1" comment="python3-perf is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055543" version="1" comment="rtla is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055544" version="1" comment="rv is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055545" version="1" comment="valkey is &lt;8.0.7-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055546" version="1" comment="valkey-devel is &lt;8.0.7-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055547" version="1" comment="thunderbird is &lt;140.8.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055548" version="1" comment="nginx is &lt;1.24.0-5.module+el9.7.0+24009+e763bdd7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055549" version="1" comment="nginx-all-modules is &lt;1.24.0-5.module+el9.7.0+24009+e763bdd7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055550" version="1" comment="nginx-core is &lt;1.24.0-5.module+el9.7.0+24009+e763bdd7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055551" version="1" comment="nginx-filesystem is &lt;1.24.0-5.module+el9.7.0+24009+e763bdd7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055552" version="1" comment="nginx-mod-devel is &lt;1.24.0-5.module+el9.7.0+24009+e763bdd7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055553" version="1" comment="nginx-mod-http-image-filter is &lt;1.24.0-5.module+el9.7.0+24009+e763bdd7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055554" version="1" comment="nginx-mod-http-perl is &lt;1.24.0-5.module+el9.7.0+24009+e763bdd7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055555" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.24.0-5.module+el9.7.0+24009+e763bdd7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055556" version="1" comment="nginx-mod-mail is &lt;1.24.0-5.module+el9.7.0+24009+e763bdd7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055557" version="1" comment="nginx-mod-stream is &lt;1.24.0-5.module+el9.7.0+24009+e763bdd7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055558" version="1" comment="go-filesystem is &lt;3.6.0-13.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055559" version="1" comment="go-rpm-macros is &lt;3.6.0-13.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055560" version="1" comment="go-rpm-templates is &lt;3.6.0-13.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055561" version="1" comment="go-srpm-macros is &lt;3.6.0-13.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055562" version="1" comment="postgresql is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055563" version="1" comment="postgresql-contrib is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055564" version="1" comment="postgresql-docs is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055565" version="1" comment="postgresql-plperl is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055566" version="1" comment="postgresql-plpython3 is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055567" version="1" comment="postgresql-pltcl is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055568" version="1" comment="postgresql-private-devel is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055569" version="1" comment="postgresql-private-libs is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055570" version="1" comment="postgresql-server is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055571" version="1" comment="postgresql-server-devel is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055572" version="1" comment="postgresql-static is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055573" version="1" comment="postgresql-test is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055574" version="1" comment="postgresql-test-rpm-macros is &lt;13.23-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055575" version="1" comment="postgresql-upgrade is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055576" version="1" comment="postgresql-upgrade-devel is &lt;13.23-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055577" version="1" comment="image-builder is &lt;31-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055578" version="1" comment="delve is &lt;1.25.2-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055579" version="1" comment="postgresql is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055580" version="1" comment="postgresql-contrib is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055581" version="1" comment="postgresql-docs is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055582" version="1" comment="postgresql-plperl is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055583" version="1" comment="postgresql-plpython3 is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055584" version="1" comment="postgresql-pltcl is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055585" version="1" comment="postgresql-private-devel is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055586" version="1" comment="postgresql-private-libs is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055587" version="1" comment="postgresql-server is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055588" version="1" comment="postgresql-server-devel is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055589" version="1" comment="postgresql-static is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055590" version="1" comment="postgresql-test is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055591" version="1" comment="postgresql-test-rpm-macros is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055592" version="1" comment="postgresql-upgrade is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055593" version="1" comment="postgresql-upgrade-devel is &lt;15.17-1.module+el9.7.0+24029+ef6a2953 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055594" version="1" comment="git-lfs is &lt;3.6.1-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055595" version="1" comment="libnfsidmap is &lt;2.5.4-38.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055596" version="1" comment="libnfsidmap-devel is &lt;2.5.4-38.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055597" version="1" comment="nfs-utils is &lt;2.5.4-38.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055598" version="1" comment="nfs-utils-coreos is &lt;2.5.4-38.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055599" version="1" comment="nfsv4-client-utils is &lt;2.5.4-38.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055600" version="1" comment="kernel is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055601" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.38.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055602" version="1" comment="kernel-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055603" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055604" version="1" comment="kernel-debug is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055605" version="1" comment="kernel-debug-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055606" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055607" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055608" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055609" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055610" version="1" comment="kernel-doc is &lt;5.14.0-611.38.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055611" version="1" comment="kernel-headers is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055612" version="1" comment="kernel-modules is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055613" version="1" comment="kernel-modules-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055614" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055615" version="1" comment="kernel-rt is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055616" version="1" comment="kernel-rt-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055617" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055618" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055619" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055620" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055621" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055622" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055623" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055624" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055625" version="1" comment="kernel-tools is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055626" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055627" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055628" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055629" version="1" comment="libperf is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055630" version="1" comment="perf is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055631" version="1" comment="python3-perf is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055632" version="1" comment="rtla is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055633" version="1" comment="rv is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055634" version="1" comment="postgresql is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055635" version="1" comment="postgresql-contrib is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055636" version="1" comment="postgresql-docs is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055637" version="1" comment="postgresql-plperl is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055638" version="1" comment="postgresql-plpython3 is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055639" version="1" comment="postgresql-pltcl is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055640" version="1" comment="postgresql-private-devel is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055641" version="1" comment="postgresql-private-libs is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055642" version="1" comment="postgresql-server is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055643" version="1" comment="postgresql-server-devel is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055644" version="1" comment="postgresql-static is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055645" version="1" comment="postgresql-test is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055646" version="1" comment="postgresql-test-rpm-macros is &lt;16.13-1.module+el9.7.0+24031+188c384c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055647" version="1" comment="postgresql-upgrade is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055648" version="1" comment="postgresql-upgrade-devel is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055649" version="1" comment="python3.12 is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055650" version="1" comment="python3.12-debug is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055651" version="1" comment="python3.12-devel is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055652" version="1" comment="python3.12-idle is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055653" version="1" comment="python3.12-libs is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055654" version="1" comment="python3.12-test is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055655" version="1" comment="python3.12-tkinter is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055656" version="1" comment="python-unversioned-command is &lt;3.9.25-3.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055657" version="1" comment="python3 is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055658" version="1" comment="python3-debug is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055659" version="1" comment="python3-devel is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055660" version="1" comment="python3-idle is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055661" version="1" comment="python3-libs is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055662" version="1" comment="python3-test is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055663" version="1" comment="python3-tkinter is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055664" version="1" comment="gimp is &lt;3.0.4-1.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055665" version="1" comment="gimp-libs is &lt;3.0.4-1.el9_7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055666" version="1" comment="gnutls is &lt;3.8.3-10.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055667" version="1" comment="gnutls-c++ is &lt;3.8.3-10.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055668" version="1" comment="gnutls-dane is &lt;3.8.3-10.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055669" version="1" comment="gnutls-devel is &lt;3.8.3-10.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055670" version="1" comment="gnutls-utils is &lt;3.8.3-10.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055671" version="1" comment="python3.11 is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055672" version="1" comment="python3.11-debug is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055673" version="1" comment="python3.11-devel is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055674" version="1" comment="python3.11-idle is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055675" version="1" comment="python3.11-libs is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055676" version="1" comment="python3.11-test is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055677" version="1" comment="python3.11-tkinter is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055678" version="1" comment="nginx is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055679" version="1" comment="nginx-all-modules is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055680" version="1" comment="nginx-core is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055681" version="1" comment="nginx-filesystem is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055682" version="1" comment="nginx-mod-devel is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055683" version="1" comment="nginx-mod-http-image-filter is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055684" version="1" comment="nginx-mod-http-perl is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055685" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055686" version="1" comment="nginx-mod-mail is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055687" version="1" comment="nginx-mod-stream is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055688" version="1" comment="aspnetcore-runtime-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055689" version="1" comment="aspnetcore-runtime-dbg-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055690" version="1" comment="aspnetcore-targeting-pack-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055691" version="1" comment="dotnet-apphost-pack-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055692" version="1" comment="dotnet-host is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055693" version="1" comment="dotnet-hostfxr-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055694" version="1" comment="dotnet-runtime-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055695" version="1" comment="dotnet-runtime-dbg-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055696" version="1" comment="dotnet-sdk-10.0 is &lt;10.0.104-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055697" version="1" comment="dotnet-sdk-10.0-source-built-artifacts is &lt;10.0.104-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055698" version="1" comment="dotnet-sdk-aot-10.0 is &lt;10.0.104-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055699" version="1" comment="dotnet-sdk-dbg-10.0 is &lt;10.0.104-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055700" version="1" comment="dotnet-targeting-pack-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055701" version="1" comment="dotnet-templates-10.0 is &lt;10.0.104-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055702" version="1" comment="libvpx is &lt;1.9.0-10.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055703" version="1" comment="libvpx-devel is &lt;1.9.0-10.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055704" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055705" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055706" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055707" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055708" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055709" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055710" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055711" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.125-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055712" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.125-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055713" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.125-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055714" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055715" version="1" comment="dotnet-templates-8.0 is &lt;8.0.125-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055716" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055717" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055718" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055719" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055720" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055721" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055722" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055723" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.115-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055724" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.115-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055725" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.115-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055726" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.115-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055727" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055728" version="1" comment="dotnet-templates-9.0 is &lt;9.0.115-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055729" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.115-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055730" version="1" comment="compat-openssl11 is &lt;1.1.1k-5.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055731" version="1" comment="kernel is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055732" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.41.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055733" version="1" comment="kernel-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055734" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055735" version="1" comment="kernel-debug is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055736" version="1" comment="kernel-debug-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055737" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055738" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055739" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055740" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055741" version="1" comment="kernel-doc is &lt;5.14.0-611.41.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055742" version="1" comment="kernel-headers is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055743" version="1" comment="kernel-modules is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055744" version="1" comment="kernel-modules-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055745" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055746" version="1" comment="kernel-rt is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055747" version="1" comment="kernel-rt-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055748" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055749" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055750" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055751" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055752" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055753" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055754" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055755" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055756" version="1" comment="kernel-tools is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055757" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055758" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055759" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055760" version="1" comment="libperf is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055761" version="1" comment="perf is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055762" version="1" comment="python3-perf is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055763" version="1" comment="rtla is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055764" version="1" comment="rv is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055765" version="1" comment="grub2-common is &lt;2.06-114.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055766" version="1" comment="grub2-efi-x64 is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055767" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055768" version="1" comment="grub2-efi-x64-modules is &lt;2.06-114.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055769" version="1" comment="grub2-pc is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055770" version="1" comment="grub2-pc-modules is &lt;2.06-114.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055771" version="1" comment="grub2-tools is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055772" version="1" comment="grub2-tools-efi is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055773" version="1" comment="grub2-tools-extra is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055774" version="1" comment="grub2-tools-minimal is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055775" version="1" comment="mysql is &lt;8.0.45-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055776" version="1" comment="mysql-common is &lt;8.0.45-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055777" version="1" comment="mysql-devel is &lt;8.0.45-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055778" version="1" comment="mysql-errmsg is &lt;8.0.45-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055779" version="1" comment="mysql-libs is &lt;8.0.45-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055780" version="1" comment="mysql-server is &lt;8.0.45-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055781" version="1" comment="mysql-test is &lt;8.0.45-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055782" version="1" comment="capstone is &lt;4.0.2-11.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055783" version="1" comment="capstone-devel is &lt;4.0.2-11.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055784" version="1" comment="capstone-java is &lt;4.0.2-11.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055785" version="1" comment="python3-capstone is &lt;4.0.2-11.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055786" version="1" comment="bsdtar is &lt;3.5.3-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055787" version="1" comment="libarchive is &lt;3.5.3-7.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055788" version="1" comment="libarchive-devel is &lt;3.5.3-7.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055789" version="1" comment="nginx is &lt;1.20.1-24.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055790" version="1" comment="nginx-all-modules is &lt;1.20.1-24.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055791" version="1" comment="nginx-core is &lt;1.20.1-24.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055792" version="1" comment="nginx-filesystem is &lt;1.20.1-24.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055793" version="1" comment="nginx-mod-devel is &lt;1.20.1-24.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055794" version="1" comment="nginx-mod-http-image-filter is &lt;1.20.1-24.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055795" version="1" comment="nginx-mod-http-perl is &lt;1.20.1-24.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055796" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.20.1-24.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055797" version="1" comment="nginx-mod-mail is &lt;1.20.1-24.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055798" version="1" comment="nginx-mod-stream is &lt;1.20.1-24.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055799" version="1" comment="vim-X11 is &lt;8.2.2637-23.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055800" version="1" comment="vim-common is &lt;8.2.2637-23.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055801" version="1" comment="vim-enhanced is &lt;8.2.2637-23.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055802" version="1" comment="vim-filesystem is &lt;8.2.2637-23.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055803" version="1" comment="vim-minimal is &lt;8.2.2637-23.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055804" version="1" comment="opencryptoki is &lt;3.25.0-4.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055805" version="1" comment="opencryptoki-ccatok is &lt;3.25.0-4.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055806" version="1" comment="opencryptoki-devel is &lt;3.25.0-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055807" version="1" comment="opencryptoki-icsftok is &lt;3.25.0-4.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055808" version="1" comment="opencryptoki-libs is &lt;3.25.0-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055809" version="1" comment="opencryptoki-swtok is &lt;3.25.0-4.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055810" version="1" comment="mecab is &lt;0.996-3.module+el9.7.0+24088+36dcab8d.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055811" version="1" comment="mecab-devel is &lt;0.996-3.module+el9.7.0+24088+36dcab8d.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055812" version="1" comment="mecab-ipadic is &lt;2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055813" version="1" comment="mecab-ipadic-EUCJP is &lt;2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055814" version="1" comment="mysql is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055815" version="1" comment="mysql-common is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055816" version="1" comment="mysql-devel is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055817" version="1" comment="mysql-errmsg is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055818" version="1" comment="mysql-libs is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055819" version="1" comment="mysql-server is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055820" version="1" comment="mysql-test is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055821" version="1" comment="mysql-test-data is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055822" version="1" comment="rapidjson-devel is &lt;1.1.0-19.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055823" version="1" comment="rapidjson-doc is &lt;1.1.0-19.module+el9.7.0+24088+36dcab8d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055824" version="1" comment="firefox is &lt;140.9.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055825" version="1" comment="firefox-x11 is &lt;140.9.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055826" version="1" comment="go-toolset is &lt;1.25.8-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055827" version="1" comment="golang is &lt;1.25.8-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055828" version="1" comment="golang-bin is &lt;1.25.8-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055829" version="1" comment="golang-docs is &lt;1.25.8-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055830" version="1" comment="golang-misc is &lt;1.25.8-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055831" version="1" comment="golang-race is &lt;1.25.8-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055832" version="1" comment="golang-src is &lt;1.25.8-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055833" version="1" comment="golang-tests is &lt;1.25.8-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055834" version="1" comment="freerdp is &lt;2.11.7-1.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055835" version="1" comment="freerdp-devel is &lt;2.11.7-1.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055836" version="1" comment="freerdp-libs is &lt;2.11.7-1.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055837" version="1" comment="libwinpr is &lt;2.11.7-1.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055838" version="1" comment="libwinpr-devel is &lt;2.11.7-1.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055839" version="1" comment="kernel is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055840" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.45.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055841" version="1" comment="kernel-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055842" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055843" version="1" comment="kernel-debug is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055844" version="1" comment="kernel-debug-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055845" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055846" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055847" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055848" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055849" version="1" comment="kernel-doc is &lt;5.14.0-611.45.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055850" version="1" comment="kernel-headers is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055851" version="1" comment="kernel-modules is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055852" version="1" comment="kernel-modules-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055853" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055854" version="1" comment="kernel-rt is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055855" version="1" comment="kernel-rt-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055856" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055857" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055858" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055859" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055860" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055861" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055862" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055863" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055864" version="1" comment="kernel-tools is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055865" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055866" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055867" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055868" version="1" comment="libperf is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055869" version="1" comment="perf is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055870" version="1" comment="python3-perf is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055871" version="1" comment="rtla is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055872" version="1" comment="rv is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055873" version="1" comment="thunderbird is &lt;140.9.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055874" version="1" comment="libxslt is &lt;1.1.34-14.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055875" version="1" comment="libxslt-devel is &lt;1.1.34-14.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055876" version="1" comment="python3.12 is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055877" version="1" comment="python3.12-debug is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055878" version="1" comment="python3.12-devel is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055879" version="1" comment="python3.12-idle is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055880" version="1" comment="python3.12-libs is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055881" version="1" comment="python3.12-test is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055882" version="1" comment="python3.12-tkinter is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055883" version="1" comment="python3.11 is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055884" version="1" comment="python3.11-debug is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055885" version="1" comment="python3.11-devel is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055886" version="1" comment="python3.11-idle is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055887" version="1" comment="python3.11-libs is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055888" version="1" comment="python3.11-test is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055889" version="1" comment="python3.11-tkinter is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055890" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055891" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055892" version="1" comment="gstreamer1-plugins-bad-free-libs is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055893" version="1" comment="gstreamer1-plugins-base is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055894" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055895" version="1" comment="gstreamer1-plugins-base-tools is &lt;1.22.12-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055896" version="1" comment="gstreamer1-plugins-good is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055897" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055898" version="1" comment="gstreamer1-plugins-ugly-free is &lt;1.22.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055899" version="1" comment="squid is &lt;5.5-22.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055900" version="1" comment="freerdp is &lt;2.11.7-1.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055901" version="1" comment="freerdp-devel is &lt;2.11.7-1.el9_7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055902" version="1" comment="freerdp-libs is &lt;2.11.7-1.el9_7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055903" version="1" comment="libwinpr is &lt;2.11.7-1.el9_7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055904" version="1" comment="libwinpr-devel is &lt;2.11.7-1.el9_7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055905" version="1" comment="grafana is &lt;10.2.6-19.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055906" version="1" comment="grafana-selinux is &lt;10.2.6-19.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055907" version="1" comment="grafana-pcp is &lt;5.1.1-13.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055908" version="1" comment="rsync is &lt;3.2.5-3.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055909" version="1" comment="rsync-daemon is &lt;3.2.5-3.el9_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055910" version="1" comment="rsync-rrsync is &lt;3.2.5-3.el9_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055911" version="1" comment="openssh is &lt;8.7p1-48.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055912" version="1" comment="openssh-askpass is &lt;8.7p1-48.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055913" version="1" comment="openssh-clients is &lt;8.7p1-48.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055914" version="1" comment="openssh-keycat is &lt;8.7p1-48.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055915" version="1" comment="openssh-server is &lt;8.7p1-48.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055916" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.48.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055917" version="1" comment="kernel is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055918" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.47.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055919" version="1" comment="kernel-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055920" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055921" version="1" comment="kernel-debug is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055922" version="1" comment="kernel-debug-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055923" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055924" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055925" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055926" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055927" version="1" comment="kernel-doc is &lt;5.14.0-611.47.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055928" version="1" comment="kernel-headers is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055929" version="1" comment="kernel-modules is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055930" version="1" comment="kernel-modules-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055931" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055932" version="1" comment="kernel-rt is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055933" version="1" comment="kernel-rt-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055934" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055935" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055936" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055937" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055938" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055939" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055940" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055941" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055942" version="1" comment="kernel-tools is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055943" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055944" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055945" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055946" version="1" comment="libperf is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055947" version="1" comment="perf is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055948" version="1" comment="python3-perf is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055949" version="1" comment="rtla is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055950" version="1" comment="rv is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055951" version="1" comment="crun is &lt;1.27-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055952" version="1" comment="fontforge is &lt;20201107-8.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055953" version="1" comment="python-unversioned-command is &lt;3.9.25-3.el9_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055954" version="1" comment="python3 is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055955" version="1" comment="python3-debug is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055956" version="1" comment="python3-devel is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055957" version="1" comment="python3-idle is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055958" version="1" comment="python3-libs is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055959" version="1" comment="python3-test is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055960" version="1" comment="python3-tkinter is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055961" version="1" comment="nginx is &lt;1.24.0-5.module+el9.7.0+24151+c43a3acf.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055962" version="1" comment="nginx-all-modules is &lt;1.24.0-5.module+el9.7.0+24151+c43a3acf.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055963" version="1" comment="nginx-core is &lt;1.24.0-5.module+el9.7.0+24151+c43a3acf.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055964" version="1" comment="nginx-filesystem is &lt;1.24.0-5.module+el9.7.0+24151+c43a3acf.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055965" version="1" comment="nginx-mod-devel is &lt;1.24.0-5.module+el9.7.0+24151+c43a3acf.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055966" version="1" comment="nginx-mod-http-image-filter is &lt;1.24.0-5.module+el9.7.0+24151+c43a3acf.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055967" version="1" comment="nginx-mod-http-perl is &lt;1.24.0-5.module+el9.7.0+24151+c43a3acf.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055968" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.24.0-5.module+el9.7.0+24151+c43a3acf.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055969" version="1" comment="nginx-mod-mail is &lt;1.24.0-5.module+el9.7.0+24151+c43a3acf.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055970" version="1" comment="nginx-mod-stream is &lt;1.24.0-5.module+el9.7.0+24151+c43a3acf.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055971" version="1" comment="nginx is &lt;1.20.1-24.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055972" version="1" comment="nginx-all-modules is &lt;1.20.1-24.el9_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055973" version="1" comment="nginx-core is &lt;1.20.1-24.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055974" version="1" comment="nginx-filesystem is &lt;1.20.1-24.el9_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055975" version="1" comment="nginx-mod-devel is &lt;1.20.1-24.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055976" version="1" comment="nginx-mod-http-image-filter is &lt;1.20.1-24.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055977" version="1" comment="nginx-mod-http-perl is &lt;1.20.1-24.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055978" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.20.1-24.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055979" version="1" comment="nginx-mod-mail is &lt;1.20.1-24.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055980" version="1" comment="nginx-mod-stream is &lt;1.20.1-24.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055981" version="1" comment="git-lfs is &lt;3.6.1-8.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055982" version="1" comment="nodejs is &lt;22.22.2-1.module+el9.7.0+24157+8ddb2461 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055983" version="1" comment="nodejs-devel is &lt;22.22.2-1.module+el9.7.0+24157+8ddb2461 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055984" version="1" comment="nodejs-docs is &lt;22.22.2-1.module+el9.7.0+24157+8ddb2461 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055985" version="1" comment="nodejs-full-i18n is &lt;22.22.2-1.module+el9.7.0+24157+8ddb2461 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055986" version="1" comment="nodejs-libs is &lt;22.22.2-1.module+el9.7.0+24157+8ddb2461 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055987" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.7.0+24157+8ddb2461 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055988" version="1" comment="nodejs-packaging is &lt;2021.06-6.module+el9.7.0+24157+8ddb2461 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055989" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-6.module+el9.7.0+24157+8ddb2461 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055990" version="1" comment="npm is &lt;10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055991" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055992" version="1" comment="nginx is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055993" version="1" comment="nginx-all-modules is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055994" version="1" comment="nginx-core is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055995" version="1" comment="nginx-filesystem is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055996" version="1" comment="nginx-mod-devel is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055997" version="1" comment="nginx-mod-http-image-filter is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055998" version="1" comment="nginx-mod-http-perl is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055999" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056000" version="1" comment="nginx-mod-mail is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056001" version="1" comment="nginx-mod-stream is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056002" version="1" comment="nodejs is &lt;24.14.1-2.module+el9.7.0+24166+51c9666b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056003" version="1" comment="nodejs-devel is &lt;24.14.1-2.module+el9.7.0+24166+51c9666b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056004" version="1" comment="nodejs-docs is &lt;24.14.1-2.module+el9.7.0+24166+51c9666b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056005" version="1" comment="nodejs-full-i18n is &lt;24.14.1-2.module+el9.7.0+24166+51c9666b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056006" version="1" comment="nodejs-libs is &lt;24.14.1-2.module+el9.7.0+24166+51c9666b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056007" version="1" comment="nodejs-nodemon is &lt;3.0.3-3.module+el9.7.0+24166+51c9666b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056008" version="1" comment="nodejs-packaging is &lt;2021.06-6.module+el9.7.0+24166+51c9666b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056009" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-6.module+el9.7.0+24166+51c9666b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056010" version="1" comment="npm is &lt;11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056011" version="1" comment="v8-13.6-devel is &lt;13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056205" version="1" comment="cockpit is &lt;344-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056206" version="1" comment="cockpit-bridge is &lt;344-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056207" version="1" comment="cockpit-doc is &lt;344-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056208" version="1" comment="cockpit-packagekit is &lt;344-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056209" version="1" comment="cockpit-storaged is &lt;344-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056210" version="1" comment="cockpit-system is &lt;344-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056211" version="1" comment="cockpit-ws is &lt;344-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056212" version="1" comment="cockpit-ws-selinux is &lt;344-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056598" version="1" comment="libnghttp2 is &lt;1.43.0-6.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056599" version="1" comment="libnghttp2-devel is &lt;1.43.0-6.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056600" version="1" comment="nghttp2 is &lt;1.43.0-6.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056376" version="1" comment="firefox is &lt;140.9.1-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056377" version="1" comment="firefox-x11 is &lt;140.9.1-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056601" version="1" comment="perl-XML-Parser is &lt;2.46-9.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056602" version="1" comment="nodejs is &lt;20.20.2-1.module+el9.7.0+24193+41b7b572 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056603" version="1" comment="nodejs-devel is &lt;20.20.2-1.module+el9.7.0+24193+41b7b572 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056604" version="1" comment="nodejs-docs is &lt;20.20.2-1.module+el9.7.0+24193+41b7b572 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056605" version="1" comment="nodejs-full-i18n is &lt;20.20.2-1.module+el9.7.0+24193+41b7b572 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056606" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.7.0+24193+41b7b572 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056607" version="1" comment="nodejs-packaging is &lt;2021.06-6.module+el9.7.0+24193+41b7b572 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056608" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-6.module+el9.7.0+24193+41b7b572 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056609" version="1" comment="npm is &lt;10.8.2-1.20.20.2.1.module+el9.7.0+24193+41b7b572 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056610" version="1" comment="bind9.18 is &lt;9.18.29-5.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056611" version="1" comment="bind9.18-chroot is &lt;9.18.29-5.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056612" version="1" comment="bind9.18-devel is &lt;9.18.29-5.el9_7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056613" version="1" comment="bind9.18-dnssec-utils is &lt;9.18.29-5.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056614" version="1" comment="bind9.18-doc is &lt;9.18.29-5.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056615" version="1" comment="bind9.18-libs is &lt;9.18.29-5.el9_7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056616" version="1" comment="bind9.18-utils is &lt;9.18.29-5.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250399"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-sdmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sll-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim-x64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tbb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tbb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tbb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tbb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-gcc-gfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-gcc-plugin-annobin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-gcc-plugin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libasan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libatomic-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libgccjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libgccjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libhwasan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libitm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-liblsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libquadmath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libstdc++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libstdc++-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libtsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libubsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-offload-nvptx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhwasan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-gcc-gfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-gcc-plugin-annobin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-gcc-plugin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libasan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libatomic-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libgccjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libgccjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libhwasan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libitm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-liblsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libquadmath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libstdc++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libstdc++-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libtsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libubsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-offload-nvptx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcs-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-6.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netstandard-targeting-pack-2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-servlet-4.0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-servlet-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qatzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qatzip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qatzip-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>microcode_ctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>delve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-toolset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-gvproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-lfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-all-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-benchtests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-gconv-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-aa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-agr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-an</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-anp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ayc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-az</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-be</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bhb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bho</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-brx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-byn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-chr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ckb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-cmn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-crh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-csb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-doi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-dsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-dv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-dz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-eo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-iu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ku</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ky</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-li</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lij</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lzh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mfe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mhr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-miq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mjw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mnw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-my</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nhn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-niu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-oc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-om</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-os</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-pap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-quz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-raj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-se</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sgs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-shn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-shs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-si</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-so</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-szl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tcy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-the</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-to</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-unm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-uz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-wa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-wae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-wal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-wo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-yi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-yo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-yue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-yuw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-zh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-minimal-langpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_hesiod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-abi-stablelists</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-cross-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-modules-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-uki-virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-modules-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-tools-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-uki-virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libperf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ca-certificates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-dbg-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-dbg-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-8.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-dbg-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-dbg-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-dbg-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-9.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-aot-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-dbg-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl100-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl1000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl105-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl135-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl2000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl2030-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl3160-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl5000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl5150-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6000g2a-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6000g2b-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6050-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl7260-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libertas-sd8787-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linux-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linux-firmware-whence</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netronome-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_proxy_cluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-all-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-http-image-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-http-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-http-xslt-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-stream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-jmods-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-jmods-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-static-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-static-libs-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-static-libs-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_dav_svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-private-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-upgrade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-kafka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmfields</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmjsonparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmkubernetes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmnormalize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmsnmptrapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-omamqp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lzma-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ipptool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-lpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-printerapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-X11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-enhanced</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-syntax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-utf16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-utf32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-img</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-audio-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-display-virtio-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-display-virtio-gpu-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-display-virtio-gpu-pci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-display-virtio-gpu-pci-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-display-virtio-vga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-display-virtio-vga-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-usb-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-usb-redirect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-ui-egl-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-ui-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-pr-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-dbg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-embedded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-ffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mysqlnd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-process</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-backup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-embedded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-embedded-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-gssapi-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-oqgraph-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-server-galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-arbitrator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-site</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-default-gems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bigdecimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-io-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-irb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-minitest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-power_assert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-psych</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rbs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rexml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-test-unit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-typeprof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygems-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-errmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-full-i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-nodemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnupg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnupg2-smime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-broker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-jsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-jsc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chroot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-dnssec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-dnssec-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-dane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpartx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-unversioned-command</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-acme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-base-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-kra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-symkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-appliance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-inspect-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rescue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-xfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-win-reg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-srpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_proxy_html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_ssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>toolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>toolbox-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ignition</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lib389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-pigeonhole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xdmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xephyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xnest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xorg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xvfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yajl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yajl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb5-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-pidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-vfs-iouring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-krb5-locator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winexe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-libgcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-libgcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-glib2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-glib2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-zlib-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-zlib-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-catatonit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-7.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-registrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-tenant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-verifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-workstation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkadm5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-packaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-packaging-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-python-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-notifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-oomd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-resolved</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-libsecret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-instaweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-subtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git-SVN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64-cdboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-pc-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>turbojpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>turbojpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-freebl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-freebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_http2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-upgrade-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-lucid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-aliyun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-amt-ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-apc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-apc-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-aws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-azure-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-bladecenter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-brocade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-cisco-mds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-cisco-ucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-drac5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-eaton-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-emerson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-gce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-heuristics-ping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-hpblade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ibm-powervs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ibm-vpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ibmblade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ifmib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-moonshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-mp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-intelmodular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ipdu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ipmilan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-kubevirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-openstack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-redfish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rhevm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-sbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-virsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-vmware-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-vmware-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-wti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virtd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virtd-cpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virtd-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virtd-multicast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virtd-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virtd-tcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ha-cloud-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>edk2-ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>edk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>edk2-tools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-freeradius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-winsupport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>butane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conmon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mako</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-good-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-jss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-ldapjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-acme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-est</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-kra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-tomcatjss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idm-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-jackson-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-jackson-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-jackson-databind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-jackson-jaxrs-json-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-jackson-jaxrs-providers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-jackson-module-jaxb-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containernetworking-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apcu-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-apcu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-apcu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-rrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-xdebug3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-agent-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtpms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-plugin-flashrom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-mapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-mapi-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openchange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-samba-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dc-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dcerpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ldb-ldap-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-usershares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-cpuguy83-md2man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-keycat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh_agent_auth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-bdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjustbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alphalph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amscls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anyfontsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anysize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atbegshi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atveryend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auxhook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avantgar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-awesomebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babelbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigfoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigintcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breqn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-capt-of</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlisle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catchfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changebar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chngcntr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collectbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontsrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-htmlxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latexrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorprofiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctablestack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dehyph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvisvgm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-environ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqparbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eso-pic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etexcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extsizes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyvrb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filehook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-finstrut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fix2col</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixlatvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-float</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmtcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncychap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontawesome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-tlwg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontwrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnotehyper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-framed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garuda-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geometry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gettitlestring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glyphlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnu-freefont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-def</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grfext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grffile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hanging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helvetic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hobsub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hologo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hycolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyph-utf8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifluatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmtarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifoddpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifplatform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-import</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-index</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-infwarerr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-intcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jknapltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kastrup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvdefinekeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvoptions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvsetkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexbug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-letltxmacro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettrine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linegoal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lineno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listofitems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltabptch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-alt-getopt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luahbtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex85</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lwarp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manfnt-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdwtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memoir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metalogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minitoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparhack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multido</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multirow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncntrsbk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-needspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newunicodechar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-norasi-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notoccite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntgclass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oberdiek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-obsolete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-palatino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paralist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parallel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parskip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-passivetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcolmk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfescape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftexcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polyglossia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pslatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pspicture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-arrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-blur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-coil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-grad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-plot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-slpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-text</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-add</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qstest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ragged2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realscripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rerunfilecheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathaccent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauerj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-section</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectsty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seminar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showexpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stackengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stringenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-prov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-symbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabulary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ini-files</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-common-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-docindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-msg-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-scripts-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive.infra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textcase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-times</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlesec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocloft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trimspaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-type1cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typehtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underscore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uniquecounter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unisugar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-updmap-map</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upquote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-url</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varwidth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-was</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy2-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasysym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wrapfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xepersian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xesearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-itrans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-tibetan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexfontinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xifthen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xkeyval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xltxtra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xunicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfchan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pg_repack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgres-decoderbufs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests+security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests+socks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cjose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clippy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-analysis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-analyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-debugger-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-lldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std-static-wasm32-unknown-unknown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std-static-wasm32-wasi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-toolset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rustfmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dmidecode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-tools-dvipdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-tools-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-tools-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3.0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2.3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-4.0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_auth_openidc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adwaita-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadwaita-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-qt5-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyqt5-sip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-qt5-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qgnomeplatform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-assistant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-designer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-doctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-linguist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qdbusviewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtgraphicaleffects</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtgraphicaleffects-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtimageformats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtimageformats-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-designer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-designercomponents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-help</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttranslations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-gdbserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-plugin-lockd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-plugin-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfastjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfastjson-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-session-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tornado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CPAN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTTP-Tiny</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-c-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow-utils-subid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow-utils-subid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-tss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-tss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-c++-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-term</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng-i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-libdns_sd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-wheel-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-jmods-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-jmods-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-static-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-static-libs-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-static-libs-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-miners</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pixman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pixman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client-epn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-trust-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipaclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipalib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipaserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipatests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-accessibility-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-accessibility-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-apidocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-fapolicyd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-ima</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-syslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-systemd-inhibit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-sign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-sign-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-App-cpanminus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-uki-virt-addons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-ppd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-atomic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-cpu-partitioning</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-spectrumscale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-bundled-gems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mysql2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mysql2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-pg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-plugins-pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-icsftok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-swtok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-dyndb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-block-blkio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-pmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-pmi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdfuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libnbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2graphite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2influxdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2spark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2zabbix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-zabbix-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-geolocate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-collectl2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-ganglia2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-activemq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bind2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bonding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bpf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bpftrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cifs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dbping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-denki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-farm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-hacluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-infiniband</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lmsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustrecomm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mailq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-memcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mongodb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-named</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-news</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nfsclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nvidia-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-openmetrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-perfevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rabbitmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-resctrl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-roomtemp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-shping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-smart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-statsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-summary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-weblog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zimbra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zswap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-system-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>motif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>motif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Attribute-Handlers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-AutoLoader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-AutoSplit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-B</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Benchmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Class-Struct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-Extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBM_Filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Devel-Peek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Devel-SelfStubber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DirHandle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Dumpvalue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DynaLoader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-English</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Errno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Constant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Miniperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Fcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Basename</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Compare</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Copy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-DosGlob</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Find</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-stat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FileCache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FileHandle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FindBin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GDBM_File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Getopt-Std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Hash-Util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Hash-Util-FieldHash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-I18N-Collate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-I18N-LangTags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-I18N-Langinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IPC-Open3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Locale-Maketext-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Math-Complex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Memoize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Loaded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-NDBM_File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-NEXT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ODBM_File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Opcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-POSIX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Functions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Safe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Search-Dict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SelectSaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SelfLoader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Symbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Hostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Term-Complete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Term-ReadLine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Text-Abbrev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Thread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Thread-Semaphore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tie-File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tie-Memoize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Time</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Time-Piece</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Unicode-UCD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-User-pwent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-autouse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-blib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-debugger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-deprecate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-diagnostics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-encoding-warnings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-fields</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-filetest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-if</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-interpreter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libnetcfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-meta-notation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-mro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-open</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-overload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-overloading</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-sigtrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-sort</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-subs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-vars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-vmsish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw-binutils-generic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw-filesystem-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw-w64-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-crt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-libffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-libstdc++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-winpthreads</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-winpthreads-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-crt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-libffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-libstdc++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-winpthreads</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-winpthreads-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeglut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeglut-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exfatprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-fips-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhel-net-naming-sysattrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-boot-unsigned</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>traceroute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-pixman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-pixman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jwcrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libsss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sssdconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common-pac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-idp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-kcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-nfs-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-passkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-polkit-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-racc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvisor-tap-vsock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-bridge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-packagekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-storaged</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-system</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bubblewrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-lanserv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xwayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-classic-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-apps-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-auto-move-windows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-classification-banner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-custom-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-dash-to-dock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-dash-to-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-desktop-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-drive-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-gesture-inhibitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-heads-up-display</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-launch-new-instance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-native-window-placement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-panel-favorites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-places-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-screenshot-window-sizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-systemMonitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-top-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-updates-dialog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-user-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-window-list</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-windowsNavigator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-workspace-indicator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-ssh-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lldpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lldpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjose-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-update-icon-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbpf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-PyMySQL+rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-PyMySQL+rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-cdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-lmdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-perl-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oci-seccomp-bpf-hook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-adsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-cloud-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-config-connectivity-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-config-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-dispatcher-routing-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-initscripts-updown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libnm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libnm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-team</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-tui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-wifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-wwan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-fips-provider-so</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-obexd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2openmetrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-uwsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libreswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libreswan-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-selinux-luna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-selinux-nfast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepalived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-debug-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-debug-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-debug-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-debug-modules-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-debug-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-modules-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-remote-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-zip-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-lpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-12.4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_security-mlogc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen-doxywizard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-gfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-offload-nvptx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-plugin-annobin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-plugin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgccjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgccjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp-offload-nvptx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm-resize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mecab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mecab-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mecab-ipadic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mecab-ipadic-EUCJP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-test-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rapidjson-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rapidjson-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client-encrypted-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-encrypted-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-JSON-XS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils-ninfod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18-chroot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18-dnssec-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-kdcproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasso-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lasso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valkey-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-rpm-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-srpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-ukify</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-redis6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_md</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync-rrsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iptraf-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aardvark-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-ostree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-ostree-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bootc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-reinstall-bootc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-ugly-free</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-rtsp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-vqsim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosynclib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosynclib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bootupd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-agent-rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvisor-tap-vsock-gvforwarder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-fs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-loop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-lvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-lvm-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mdraid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-nvdimm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-nvme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-part</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-plugins-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-swap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-blockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Find-Rule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weldr-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-binutils-gprofng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgis-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgis-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgis-upgrade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgis-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jmc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpsd-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpsd-minimal-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-crypto-adapter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-crypto-adapter-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-crypto-adapter-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-jmods-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-jmods-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-static-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-static-libs-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-static-libs-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-nutanix-ahv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-15-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-15-binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-15-binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-15-binutils-gprofng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-wheel-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brotli-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-13.6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyasn1-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>image-builder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-utils-coreos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfsv4-client-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-dbg-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-dbg-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-10.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-aot-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-dbg-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>capstone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>capstone-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>capstone-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-capstone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-ccatok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Parser</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.5-1.el9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.8-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.3-8.el9_5.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.1-1.3.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.1-1.3.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3.1-2.2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3.1-2.2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.9-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.7-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.107-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.50-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220809-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.6-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.6-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.10-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.10-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-12.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-12.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-8.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-8.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-100.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-100.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-100.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.10-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.10-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.22.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.22.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.22.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2024.2.69_v8.0.303-91.4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.12-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.112-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.102-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20250716-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20250812-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.0-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.22-1.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240910-1.20250211.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20250211-1.20250512.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-5.module+el9.3.0.z+20438+032561a0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-5.module+el9.3.0.z+20438+032561a0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230808-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0~rc.2-0.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.100~rc.2-0.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.12-2.module+el9.3.0+21263+4e58afe8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.12-2.module+el9.3.0+21263+4e58afe8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230808-2.20240531.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.15.0.10-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.3.0.7-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332.b09-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332.b09-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-9.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-31.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-10.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.5-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.105-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-3.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-5.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-9.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-9.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.1-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.7-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2102.0-101.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2102.0-101.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-4.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.5-8.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.5-8.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-13.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-13.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-13.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.6-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.106-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-16.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-16.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-12.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-14.el9_0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-14.el9_0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.17.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.17.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.37-5.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.37-5.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.3-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.3-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-11.el9_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.16.0.8-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.342.b07-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.342.b07-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.11-5.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.4.0.8-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.12-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.12-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.13-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-16.el9_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-16.el9_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.11-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.16-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.22.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.22.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.8-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.108-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-14.el9_0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-14.el9_0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.13.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-9.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-9.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-41.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-41.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-10.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.5-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.9-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.109-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-251.3.bfb2f92.git.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-251.3.bfb2f92.git.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.33-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.7-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.2-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.3-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.3-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.7-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.2-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.33-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.30-3.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.16.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.16.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.16.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.19-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.11.0-1.16.16.0.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28-5.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.26.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.26.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-6.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-3.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-12.el9_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-1.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-12.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-12.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8-3.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.10-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.110-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.1-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.1-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.1-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.15.0-1.16.17.1.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.5.0.8-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352.b08-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352.b08-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.17.0.8-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-7.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-4.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.4.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-5.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-7.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-7.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-43.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-43.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-32.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.30.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.30.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.10-3.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.10-3.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.6-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.6-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2-4.el9_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.3-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.4-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.4-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.2-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.2-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.0-7.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.0-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-6.el9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.3-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.15-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.53-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.53-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-5.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-5.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-5.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.85-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-3.20211109gitb79fd91.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-4.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-4.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.20-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.11.2-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.11.2-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.6.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.6.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-18.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-18.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-101.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-101.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-101.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.46.5-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.46.5-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.4-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-17.b1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-17.b1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.0-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-0.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-11.2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.1-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-7.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-7.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-0.5.rc2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.100-0.5.rc2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.1-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.1-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-12.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-12.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-1.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-1.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-24.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-24.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-2.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-2.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.1-1.module+el9.1.0.z+17326+318294bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.1-1.module+el9.1.0.z+17326+318294bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-1.module+el9.1.0.z+17326+318294bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.1.0+15718+e52ec601</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.2-1.18.12.1.1.module+el9.1.0.z+17326+318294bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.1-9.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.13-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.113-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6.0.10-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.18.0.10-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.362.b09-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.362.b09-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5p2-7.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.0-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-5.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-5.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-10.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-10.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-10.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.18-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.18.1-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.18.1-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.18.1-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.2-1.16.18.1.3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.9-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.9-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-19.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-19.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.12.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.12.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.20-7.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.20-7.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.20-7.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:250-12.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:250-12.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:250-12.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.1-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.8-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.0-8.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.0-8.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.13-8.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.1-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.1-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.1-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.1-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-5.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-5.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-46.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-46.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.8.0-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-1.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-47.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-47.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.18.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.18.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:53.0.0-10.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-1.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-1.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:250-12.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:250-12.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:250-12.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.4-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-20.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-20.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.27-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.53-7.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.53-7.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.3-4.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.90-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.90-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-18.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-18.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.9.0-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.34.0-17.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.0-17.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.0-17.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.9.0-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.22.2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.22.2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.3-4.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-5.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-5.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.53-7.el9_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.53-7.el9_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.19-3.el9_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.10-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.17-3.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-19.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-19.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.23.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.23.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.10.0-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.10.0-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7.0.7-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.19.0.7-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372.b07-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372.b07-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-1.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-6.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-6.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-103.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-103.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-103.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-43.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-43.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-14.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20221207gitfff6d81270b5-9.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20221207gitfff6d81270b5-9.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.21-37.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.6-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.7-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5.4-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-17.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-17.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-17.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-13.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-13.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-14.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-14.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.4-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-0.1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.1-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.27-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.21-1.module+el9.1.0.z+15477+cb86791d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.14-1.module+el9.2.0+17911+b059dfc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.21-1.module+el9.1.0.z+15477+cb86791d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-4.module+el9.1.0.z+15477+cb86791d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-1.module+el9.1.0.z+15477+cb86791d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-1.module+el9.1.0.z+15477+cb86791d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.1-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.1-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-3.20211126git1ff6fe1f43.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-284.11.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.11.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.11.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-20.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-20.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-18.b1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-18.b1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-102.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-102.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-40.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-102.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-6.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-6.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.4-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-65.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.32-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-8.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-8.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-29.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.29.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.4-7.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-1.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.14.2-2.module+el9.2.0.z+18497+a402347c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.14.2-2.module+el9.2.0.z+18497+a402347c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-2.module+el9.2.0.z+18497+a402347c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.19.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.19.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.19.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-3.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.3-1.16.19.1.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.11.0-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-20.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-20.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-4.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.11.0-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.3-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.3-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.7-11.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.7-11.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-1.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1-5.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.14.2-3.module+el9.2.0.z+18964+42696395</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.14.2-3.module+el9.2.0.z+18964+42696395</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.18-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.118-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.2-2.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.19.1-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.19.1-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.19.1-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.3-1.16.19.1.2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.12.0-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.107-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-1.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-1.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200406-26.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200406-26.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180414-29.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200406-26.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-8.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-8.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.11-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-10.2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-16.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-16.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-284.18.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.18.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.18.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.10-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.10-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.9-3.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.9-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.109-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.20-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.120-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.13.0-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.20.0.8-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.8.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382.b05-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382.b05-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-1.el9_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-103.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-103.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-103.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.8-1.module+el9.2.0+17405+aeb9ec60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.module+el9.2.0+17405+aeb9ec60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.3-1.module+el9.2.0.z+19113+6f5d9d63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.3-1.module+el9.2.0.z+19113+6f5d9d63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.4-1.16.20.1.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-3.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-3.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-3.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1-7.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-284.25.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.25.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.25.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-13.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-30.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.14.0-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.20-7.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.20-7.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.20-7.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9-10.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66.1-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66.1-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66.1-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.10-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.110-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.21-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.121-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-16.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-16.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-16.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.0-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3-7.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-284.30.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.30.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.30.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48-9.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.2-6.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.2-6.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.7-1.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.7-1.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-14.el9_2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.22-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.122-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.11-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.111-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-5.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-5.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-7.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-7.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.5-1.el9_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.17.1-1.module+el9.2.0.z+19753+58118bc0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.17.1-1.module+el9.2.0.z+19753+58118bc0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.2.0.z+19753+58118bc0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-60.el9_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-60.el9_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-60.el9_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.2-2.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-10.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-10.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-10.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-1.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-1.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.4-1.16.20.2.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-7.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.14-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.22-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.23-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.123-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-14.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-14.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392.b08-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392.b08-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.13-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.13-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.21.0.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.12-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.112-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9.0.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-3.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-3.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-3.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.4-1.16.20.2.3.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-5.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-5.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.9-4.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-3.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-3.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.30-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.62-11.el9_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.module+el9.2.0.z+20353+5a828d50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.module+el9.2.0.z+20353+5a828d50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.0-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.24-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.124-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.13-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.113-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-11.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-11.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-11.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-5.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.1-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230524-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230524-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.2-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.3-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9.4-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.11.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.1.1-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.19-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0-7.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-7.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.11-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.9-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.9-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-11.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-11.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.3-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.5-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.0-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.85-14.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.076-461.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-22.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.72-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.72-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5.4-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.62-37.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-362.8.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.8.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.8.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.0-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.2-42.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.2-42.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230814-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:36.0.1-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-100.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-100.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-41.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-100.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-26.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-26.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.2.3-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-10.20210508.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-10.20210508.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-10.20210508.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.17-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.17-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-15.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-15.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36.2-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-14.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-14.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-14.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.1.0.12-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-101.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-101.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-101.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-26.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-26.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-5.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-5.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-6.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.100-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.14-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.114-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.25-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.125-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.5-3.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-6.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.5.0-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-12.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-1.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-5.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-5.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-362.13.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.13.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.13.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-55.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-55.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.0-6.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.3-3.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.9-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.3-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-7.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-7.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.13-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.5-1.module+el9.2.0.z+20667+a2d2a8a9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.5-1.module+el9.2.0.z+20667+a2d2a8a9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.0-3.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.6.0-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-3.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-3.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-6.el9_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.35.0-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.0-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.0-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-5.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-5.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.15-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.115-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.101-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.26-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.126-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.2.0.13-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402.b06-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402.b06-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402.b06-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.22.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-25.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-25.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.27-1.module+el9.3.0.z+21063+f4ccb976</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-362.18.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.18.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.18.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.1.3-27.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.1.3-27.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.1.3-27.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.5-3.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.1-7.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-1.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-1.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-70.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-70.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.62-37.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-11.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-11.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-23.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-23.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-3.el9_3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-3.el9_3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.7.0-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.35.0-6.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.0-6.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.0-6.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.16-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.116-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.27-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.127-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5p2-10.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.102-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.6-1.module+el9.3.0+21283+b0ea34b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.6-1.module+el9.3.0+21283+b0ea34b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.14-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.0-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.0-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-3.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-3.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7044-14.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-22.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-22.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.15.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.15.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.15.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.3-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230524-4.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230524-4.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.18-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.18-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.33-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.7-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.2-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.3-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.4.1-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.7-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.2-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.33-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.27-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.11-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.0-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.4-1.module+el9.1.0+15737+76195479</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.4-1.module+el9.1.0+15737+76195479</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-1.module+el9.1.0+15737+76195479</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-1.module+el9.1.0+15737+76195479</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.6-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.1.1-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.3-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.6-1.module+el9.5.0+22422+63e067d8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.6-1.module+el9.5.0+22422+63e067d8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.16.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.16.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.16.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.23-1.module+el9.4.0+20748+b46899d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.25-1.module+el9.5.0+22477+5fdac06d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.23-1.module+el9.4.0+20748+b46899d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-4.module+el9.4.0+20748+b46899d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-2.module+el9.4.0+20796+bd4564df</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.3-1.module+el9.4.0+20748+b46899d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.30-1.module+el9.5.0+22481+3e1c6d75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.5-2.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-7.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240524-6.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240524-6.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-8.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-8.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-8.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.12-2.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.9-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.9-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-26.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-26.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-34.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.34.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.62-37.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-13.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-13.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.36-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22-3.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-21.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.3-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.4-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-9.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-9.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-362.24.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.24.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.24.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.17-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.117-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.3-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.103-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.85-14.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-6.el9_3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.28-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.4-1.16.20.2.4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.1-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.0-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-8.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.19.1-1.module+el9.3.0+21388+22892fb9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.19.1-1.module+el9.3.0+21388+22892fb9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.3.0+19762+d716bf3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.4-1.18.19.1.1.module+el9.3.0+21388+22892fb9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-1.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.26-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.11-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.0-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.6-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.0-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.3-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.26-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.1-1.module+el9.3.0+21385+bac43d5a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.1-1.module+el9.3.0+21385+bac43d5a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.3.0.z+20478+84a9f781</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.3.0+19518+63aad52d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-4.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-4.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-3.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-3.el9_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-3.el9_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-14.el9_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-14.el9_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-14.el9_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.9-8.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412.b08-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412.b08-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412.b08-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.23.0.9-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.23.0.9-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.11.0.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.3.0.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.19-5.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-23.el9_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-23.el9_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.10.0-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-1.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.5-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.7-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.5-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.0-11.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.13-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.0-9.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.0-9.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.3-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.3-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.12-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-24.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-24.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-24.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.9-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.99.0-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.4-28.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.01-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.74-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.80-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.66-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.03-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.06-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.06-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.05-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.47-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.09-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.85-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.100.600-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.02-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.03-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.67-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.94-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.07-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.08-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.403-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.05-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3401-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.75-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.04-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.800-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.65-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.02-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.0-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-0.1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.6-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.14-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20231122-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231122-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-12.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-12.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.90-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.90-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:37.0.2-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:148-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.71-11.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.71-11.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.49-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.20-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.13.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.13.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.13.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-10.git1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.4-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-20.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-20.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-27.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-27.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-77.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-77.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:252-32.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:252-32.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:252-32.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-18.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.39-16.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.39-16.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.39-16.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.42.2-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.7-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-18.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-18.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-18.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.9-9.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.0-6.2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.9-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.9-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-16.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-8.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-8.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.16.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.16.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.16.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.2-2.module+el9.4.0+21742+692df1ea</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.2-2.module+el9.4.0+21742+692df1ea</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.0-1.18.20.2.2.module+el9.4.0+21742+692df1ea</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.5-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.105-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.19-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.119-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.12.2-2.module+el9.4.0+21731+46b5b8a7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.12.2-2.module+el9.4.0+21731+46b5b8a7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.11.0-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-8.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-8.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-8.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.4-1.16.20.2.8.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.18.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.18.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.18.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-1.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-100.el9_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-100.el9_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-100.el9_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-5.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-5.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.20.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.20.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.20.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.27-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.11-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.0-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.6-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.1.1-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.3-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-144.module+el9.4.0+21780+79b7bdb5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-1.module+el9.4.0+21222+faeeed2f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-1.module+el9.4.0+21222+faeeed2f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.module+el9.4.0+21222+faeeed2f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.module+el9.4.0+21222+faeeed2f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.3.1-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.6-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.9-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.9-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.0-15.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.0-15.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.7-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.6-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-8.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-8.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.33-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.7-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.2-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.3-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.4.1-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.7-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.2-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.33-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:311.2-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:311.2-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-7.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.0-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-16.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-16.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-16.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.1-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-2.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.7-1.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.43.5-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.43.5-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.5.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.5.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.11-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.11-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.0-11.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-38.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.38.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.24.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.24.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.24.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.7-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.32-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.132-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.7-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.107-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-38.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.38.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.13.0-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422.b05-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422.b05-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422.b05-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.24.0.8-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.12.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.4.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.26.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.26.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.26.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-11.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-11.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20231122-6.el9_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231122-6.el9_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.0-6.6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.7-1.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240603-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-27.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-27.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-27.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-13.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.28.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.28.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.28.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.21-40.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-11.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-11.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-9.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-9.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-18.el9_4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-18.el9_4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-18.el9_4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.9-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:65.5.1-2.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.14.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.8-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.108-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.31.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.31.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.31.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.14.0-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-29.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-29.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.2-3.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:53.0.0-12.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-1.el9_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.16.0-1.module+el9.4.0+22197+9e60f127</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.16.0-1.module+el9.4.0+22197+9e60f127</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.33.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.33.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.33.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.8-1.module+el9.4.0+20427+07482b8c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0-1.module+el9.4.0+20427+07482b8c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-1.Final.module+el9.4.0+20427+07482b8c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.4-1.module+el9.4.0+22207+8466e31f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.4-1.module+el9.4.0+22207+8466e31f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.16-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.1-4.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.4-1.module+el9.4.0+22195+c221878e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.4-1.module+el9.4.0+22195+c221878e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.5-5.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.7-1.el9_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.31-7.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.31-7.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.7-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-8.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-17.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-17.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-17.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-7.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-14.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-14.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-14.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-11.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-11.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.35.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.35.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.35.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.2.0-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-2.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-28.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-28.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.5-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.5-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.16-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.3.1-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.6-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.9-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.16-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-17.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.37.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.37.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.37.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.1-13.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.1-13.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.7-17.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.7-17.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240905-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.0-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.35-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.135-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.10-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.110-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.1-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.1-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.32-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-13.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-13.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.9-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.432.b06-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.432.b06-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.432.b06-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.25.0.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.13.0.11-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.5.0.10-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.40.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.40.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.40.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.1-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.7-1.el9_4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.1-4.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.10-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.42.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.42.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.42.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-19.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-2.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.4.0-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-2.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-2.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-12.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-12.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20231122-6.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231122-6.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-16.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-16.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240524-6.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240524-6.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40.7-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.10-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-26.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-26.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-26.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.0-7.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-10.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.3-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.31-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.31-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30.0-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30.0-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.5-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.8-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.8-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.13-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.62-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.62-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.10-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.10-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.10-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:323.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:323.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-6.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-6.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-6.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-6.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240910-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.72-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.72-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201107-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-8.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-7.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.5-2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.2-7.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.2-7.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.2-7.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-9.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-9.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.18-2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.12-2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.5-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-8.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-8.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-31.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-31.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-31.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-9.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-7.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-4.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-4.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-3.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.100-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.4.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.3-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.22-4.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-8.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.14.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.14.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.14.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-14.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-8.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.21.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.21.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.21.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.6.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.5-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.6.0-3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9-13.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.11-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.11-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-76.el9_5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-76.el9_5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-32.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-20.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-20.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-1.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-1.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.10-5.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.10-5.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.10-5.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.14.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.6.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.22.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.22.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.22.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-7.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.7-1.module+el9.5.0+22705+3d861c1c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.7-1.module+el9.5.0+22705+3d861c1c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.17-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.17-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.17-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-8.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.20-1.module+el9.5.0+22578+dc54e53f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.11.10-1.module+el9.5.0+22578+dc54e53f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.20-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.27-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.8-4.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-13.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-13.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.6-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-10.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-10.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78.6-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.12.0-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.11-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.9-1.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4.1-6.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.25.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.25.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:53.0.0-13.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-12.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-12.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-17.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.0-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.7.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.4-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.4-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.26.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.26.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.4-4.el9_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462.b08-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462.b08-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462.b08-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.28.0.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.28.0.6-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.16.0.8-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.8.0.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-16.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-16.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-16.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-3.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-22.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-22.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.28.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.28.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.19-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.19-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.19-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.47.3-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.47.3-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-86.el9_6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-86.el9_6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.13.0-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.16.0-2.module+el9.6.0+23339+d3c8acfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.16.0-2.module+el9.6.0+23339+d3c8acfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.6.0+23339+d3c8acfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.6.0+23339+d3c8acfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.2-1.22.16.0.2.module+el9.6.0+23339+d3c8acfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.16.0.2.module+el9.6.0+23339+d3c8acfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.01-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.74-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.80-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.66-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.03-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.06-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.06-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.05-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.47-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.09-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.85-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.100.600-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.02-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.03-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.67-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.94-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.07-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.08-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.403-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.05-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3401-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.75-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.04-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.800-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.65-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.02-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-19.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-19.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.30.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.30.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.1-8.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.10-1.module+el9.6.0+23332+115a3b01</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.10-1.module+el9.6.0+23332+115a3b01</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:67.1-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:67.1-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.3-8.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.3-8.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-5.20211126git1ff6fe1f43.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.13.0-3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.23.2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.23.2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.23.2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.32.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.32.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.2-5.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.6-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.6-6.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-10.20210508.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-10.20210508.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-10.20210508.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.1-1.3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.1-1.3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3.1-2.2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3.1-2.2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-12.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-6.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-6.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-12.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-12.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.5.0-5.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.5.0-5.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-6.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-6.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:65.5.1-4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.33.2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.33.2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.5-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.6-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.6-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.35.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.35.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:366-12.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-6.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-6.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-3.el9_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.14.0-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.37.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.37.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.18.2-1.module+el9.5.0+22758+4ad2c198</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.18.2-1.module+el9.5.0+22758+4ad2c198</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.2-1.20.18.2.1.module+el9.5.0+22758+4ad2c198</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.6-1.module+el9.5.0+22773+9a359385</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.6-1.module+el9.5.0+22773+9a359385</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.5.0+22773+9a359385</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.5.0+22773+9a359385</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.2-1.18.20.6.1.module+el9.5.0+22773+9a359385</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-103.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.14.0-3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.module+el9.6.0+22880+6b241eec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.2-2.module+el9.6.0+22979+c3d78d52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.10-1.module+el9.6.0+23420+848a4539</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.10-1.module+el9.6.0+23420+848a4539</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.8-2.module+el9.5.0+22224+f5585c78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.14-1.module+el9.6.0+23419+7863ab62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.14-1.module+el9.6.0+23419+7863ab62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.22-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.22-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-4.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.9-1.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.11-2.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.39.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.39.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-11.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-11.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-2.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-2.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.62-4.el9_6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.62-4.el9_6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-26.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-26.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.41.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.41.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:41.0.7-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.42.2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.42.2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-33.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-33.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-33.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.44.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.44.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:36.0.1-5.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-13.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-13.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.996-3.module+el9.6.0+22713+cbf15e23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.6-1.module+el9.6.0+23497+d0c5dcca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.6-1.module+el9.6.0+23497+d0c5dcca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-19.module+el9.6.0+22713+cbf15e23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-19.module+el9.6.0+22713+cbf15e23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.43-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.3.0-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-6.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-6.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.13.1-1.module+el9.5.0+22763+17233acb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.13.1-1.module+el9.5.0+22763+17233acb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.5.0+22763+17233acb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.5.0+22763+17233acb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.2-1.22.13.1.1.module+el9.5.0+22763+17233acb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.13.1.1.module+el9.5.0+22763+17233acb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.46.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.46.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.26.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.26.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.26.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.41-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-24.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-24.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-24.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.49.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.49.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-14.el9_6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-14.el9_6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.04-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.51.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.51.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.20-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.20-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.20-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5.0-1.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210202-11.el9_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-22.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-22.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.52.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.52.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.1-0.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.21-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.121-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.10-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.111-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.4.0-3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-15.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-15.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.55.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.55.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.4.0-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472.b08-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472.b08-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472.b08-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.29.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.29.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.17.0.10-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.9.0.10-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.58.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.58.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-13.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-13.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-11.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-11.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.20-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.20-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.20-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.11-1.module+el9.6.0+23552+a3d3d132</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.11-1.module+el9.6.0+23552+a3d3d132</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.60.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.60.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-32.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-32.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-32.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-9.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-9.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.9-2.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.22-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.29-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.7-5.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-10.el9_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.62.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.62.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.29-4.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.29-4.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.29-4.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-31.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-31.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-31.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.6-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.5.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.5.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-114.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-114.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-15.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-15.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.71-12.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.71-12.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-6.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-6.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.1-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.20-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.20-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.20-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-22.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-22.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-22.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.1-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-15.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-15.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-23.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-23.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-4.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-4.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-4.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.11-1.module+el9.7.0+23559+d075163a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.11-1.module+el9.7.0+23559+d075163a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-15.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-15.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-4.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-6.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-6.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-12.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.7-5.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-32.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-32.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-32.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.10-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-34.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-34.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-34.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.29-5.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.29-5.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.29-5.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-4.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-4.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.5.0-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-11.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-11.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.8.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.8.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.14-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.2-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.3-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.3-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.6-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.9.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.9.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-12.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-12.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.6-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-5.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-14.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-14.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.11.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.11.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:252-55.el9_7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:252-55.el9_7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:252-55.el9_7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.3-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.13.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.13.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.6.0-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-6.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.22-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-3.module+el9.7.0+23362+7018fe7e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-3.module+el9.7.0+23362+7018fe7e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.3.1-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.9-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.22-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-17.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.44-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.7-1.module+el9.7.0+23698+51fa9c99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.7-1.module+el9.7.0+23698+51fa9c99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-8.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-8.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.12.1-11.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.12.1-11.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.16.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.16.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.23-1.module+el9.6.0+22647+1741ae35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.26-1.module+el9.7.0+23549+c13c2ce3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.23-1.module+el9.6.0+22647+1741ae35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.0-2.module+el9.6.0+22647+1741ae35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-4.module+el9.6.0+22647+1741ae35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-1.module+el9.6.0+22647+1741ae35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.3-1.module+el9.6.0+22647+1741ae35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-21.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-21.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.2-67.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.2-67.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-47.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.47.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-17.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-17.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.8.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.4-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-4.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.62-7.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.62-7.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.8-1.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-1.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-1.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.31.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.31.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.31.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.104-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.14-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.114-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-6.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-6.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.6-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-94.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-94.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.8.0-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.34-9.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-76.el9_5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-76.el9_5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.34.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.34.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.34.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-8.module+el9.5.0+22953+b175c265.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-8.module+el9.5.0+22953+b175c265.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-4.module+el9.5.0+22954+e2d70a1c.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-4.module+el9.5.0+22954+e2d70a1c.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-15.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-15.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-9.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-8.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-10.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.35.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.35.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.35.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-3.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.9.0-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-4.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-4.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.5-2.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-7.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.1-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.6-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.6-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.5-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452.b09-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452.b09-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452.b09-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.27.0.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.27.0.6-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.15.0.6-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.7.0.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.38.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.38.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.38.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.34-9.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.9.2-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-125.el9_5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-125.el9_5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-125.el9_5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.32-1.module+el9.5.0+23047+aadb97d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.40.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.40.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.40.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.10.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.33-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.7-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.2-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.3-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.4.1-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.7-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.2-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.33-165.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.7-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.7-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.27-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.11-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.0-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.6-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.3-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-9.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-9.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-10.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.22-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.3.1-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.9-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.22-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-11.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-11.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.12.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.12.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-104.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-104.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-45.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.45.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20250211-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.0-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.0-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.11-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0-16.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0-16.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2025.5-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2025.5-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-28.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-28.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-28.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.7-3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.9-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.9-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.27-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.2-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.30-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:41.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-22.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-22.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.1-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.4-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-9.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-9.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-8.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-8.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-22.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-22.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.47.1-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.47.1-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.34-13.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.5-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.19-1.module+el9.6.0+23015+da8065b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-1.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-18.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-18.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-18.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.16.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.16.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.19.1-1.module+el9.6.0+23053+4195b0b2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.19.1-1.module+el9.6.0+23053+4195b0b2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.2-1.20.19.1.1.module+el9.6.0+23053+4195b0b2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:366-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.10.0-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.8-1.module+el9.6.0+23049+8374f320</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.8-1.module+el9.6.0+23049+8374f320</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.3-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.3-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.30-3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.28-1.module+el9.6.0+23063+43495379</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.15.0-1.module+el9.6.0+23062+9e7801b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.15.0-1.module+el9.6.0+23062+9e7801b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.6.0+23062+9e7801b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.6.0+23062+9e7801b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.2-1.22.15.0.1.module+el9.6.0+23062+9e7801b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.15.0.1.module+el9.6.0+23062+9e7801b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-10.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-22.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-22.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.18-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.18-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.18-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-22.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-22.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-5.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-19.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-19.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-19.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.16-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.116-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.5-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.106-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-13.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-13.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.17.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.17.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-5.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.10.1-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-10.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-2.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.18.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.18.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-18.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-18.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.11.0-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.19.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.19.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-6.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-6.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.16.0-1.module+el9.6.0+23151+b1496e9d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.16.0-1.module+el9.6.0+23151+b1496e9d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.2-1.22.16.0.1.module+el9.6.0+23151+b1496e9d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.16.0.1.module+el9.6.0+23151+b1496e9d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.19.2-1.module+el9.6.0+23146+be9976bd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.19.2-1.module+el9.6.0+23146+be9976bd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.6.0+23146+be9976bd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.6.0+23146+be9976bd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.2-1.20.19.2.1.module+el9.6.0+23146+be9976bd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.9-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.9-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.79-8.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.21.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.21.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-14.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.17-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.117-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.6-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.107-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.6-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.22.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.22.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-9.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.4-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.5-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-4.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-4.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-14.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-14.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.23.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.23.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-31.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.7-4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-31.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-31.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-8.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-8.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-14.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-14.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.82-6.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-1.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-8.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-8.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-5.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-5.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210202-11.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.22-1.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-14.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-14.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34-19.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-25.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-25.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:35.12-4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.24.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.24.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5p2-10.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-5.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-5.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-23.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-23.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-23.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.29-3.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.37-12.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.11.15-1.module+el9.7.0+23768+0a6844e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-34.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-34.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-34.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-12.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.8-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.20.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.20.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-11.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-11.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.15-2.module+el9.7.0+23785+f55bffc9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.15-2.module+el9.7.0+23785+f55bffc9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-3.module+el9.7.0+23421+025f8139</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11-1.module+el9.7.0+23784+0c5a3b34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11-1.module+el9.7.0+23784+0c5a3b34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5-6.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.0-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.1-17.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.1-17.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7b-11.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-5.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.0-18.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.1-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.24.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.24.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.30.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.30.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.5-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.5-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.18.0.8-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.10.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482.b08-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482.b08-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482.b08-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.2.0.10-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-18.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-18.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-18.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.5-6.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.19-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.12-5.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.26.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.26.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-98.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-98.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-35.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-35.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44-3.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44-3.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-4.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.30-1.module+el9.7.0+23849+7b831f17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-5.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.29-1.module+el9.7.0+23852+76de6b03</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-3.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-3.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9-14.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.27.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.27.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-98.el9_7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-98.el9_7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.4-21.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.4-21.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.2-3.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201107-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.30.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.30.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-12.el9_7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.12.1-11.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.12.1-11.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.10-1.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.34.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.34.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20241117-4.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20241117-4.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.13.0-1.module+el9.7.0+23894+c8377628</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.13.0-1.module+el9.7.0+23894+c8377628</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-3.module+el9.7.0+23894+c8377628</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-6.module+el9.7.0+23894+c8377628</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.6.2-1.24.13.0.1.module+el9.7.0+23894+c8377628</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.6.233.17-1.24.13.0.1.module+el9.7.0+23894+c8377628</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.0-1.module+el9.7.0+23896+b5802de9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.0-1.module+el9.7.0+23896+b5802de9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.7.0+23896+b5802de9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-5.module+el9.7.0+23896+b5802de9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.4-1.22.22.0.1.module+el9.7.0+23896+b5802de9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.22.0.1.module+el9.7.0+23896+b5802de9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.20.0-1.module+el9.7.0+23895+0637d423</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.20.0-1.module+el9.7.0+23895+0637d423</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.7.0+23895+0637d423</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-5.module+el9.7.0+23895+0637d423</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.2-1.20.20.0.1.module+el9.7.0+23895+0637d423</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-231.el9_7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-231.el9_7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-231.el9_7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.30-5.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-18.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.30-14.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.13-14.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.13-14.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-12.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.35.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.35.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0-17.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0-17.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-10.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-10.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.8-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-14.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-14.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.8.0-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-3.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-3.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.8-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.37-12.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.36.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.36.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.7-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.8.0-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-5.module+el9.7.0+24009+e763bdd7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-5.module+el9.7.0+24009+e763bdd7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-13.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-13.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31-3.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.2-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.17-1.module+el9.7.0+24029+ef6a2953</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.17-1.module+el9.7.0+24029+ef6a2953</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.4-38.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.4-38.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.38.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.38.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13-1.module+el9.7.0+24031+188c384c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13-1.module+el9.7.0+24031+188c384c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-4.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-3.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-3.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-10.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-10.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-5.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.3-2.module+el9.7.0+24008+f3da7534</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.3-2.module+el9.7.0+24008+f3da7534</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.4-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.104-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-10.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.25-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.125-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.14-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.115-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-5.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.41.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.41.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-114.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-114.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.45-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-11.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-11.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-11.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-24.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-24.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-23.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-23.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.25.0-4.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.25.0-4.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.996-3.module+el9.7.0+24088+36dcab8d.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.8-1.module+el9.7.0+24088+36dcab8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.8-1.module+el9.7.0+24088+36dcab8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-19.module+el9.7.0+24088+36dcab8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-19.module+el9.7.0+24088+36dcab8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.9.0-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.8-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.8-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.45.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.45.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.34-14.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-4.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-5.2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-5.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-5.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-4.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-22.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-19.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-13.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-3.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-3.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-48.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.48.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.47.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.47.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201107-8.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-3.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-3.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-5.module+el9.7.0+24151+c43a3acf.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-5.module+el9.7.0+24151+c43a3acf.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-24.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-24.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-8.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.2-1.module+el9.7.0+24157+8ddb2461</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.2-1.module+el9.7.0+24157+8ddb2461</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.7.0+24157+8ddb2461</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-6.module+el9.7.0+24157+8ddb2461</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.3-2.module+el9.7.0+24173+4204b761.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.3-2.module+el9.7.0+24173+4204b761.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.14.1-2.module+el9.7.0+24166+51c9666b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.14.1-2.module+el9.7.0+24166+51c9666b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-3.module+el9.7.0+24166+51c9666b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-6.module+el9.7.0+24166+51c9666b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:344-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:344-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-6.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-6.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.9.1-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46-9.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.20.2-1.module+el9.7.0+24193+41b7b572</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.20.2-1.module+el9.7.0+24193+41b7b572</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.7.0+24193+41b7b572</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-6.module+el9.7.0+24193+41b7b572</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.2-1.20.20.2.1.module+el9.7.0+24193+41b7b572</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.29-5.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.29-5.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.29-5.el9_7.4</evr>
  </rpminfo_state>
</states>
</oval_definitions>
